E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by TechTarget Security
EGUIDE:
This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011
|
|
|
E-Guide: Preventing and detecting security vulnerabilities in Web applications
sponsored by TechTarget Security
EGUIDE:
The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.
Posted: 14 Jul 2011 | Published: 14 Jul 2011
|
|
|
E-Guide: Evaluating IaaS security risks
sponsored by TechTarget Security
EGUIDE:
This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that need to be considered in the cloud.
Posted: 13 Jun 2011 | Published: 13 Jun 2011
|
|
|
E-Guide: IAM - Key concepts and predictions for 2011
sponsored by CA Technologies
EGUIDE:
This expert e-guide discusses key trends that will significantly impact identity and access management concepts in 2011, and highlights the critical questions any organization must ask when selecting an IAM product.
Posted: 10 Aug 2011 | Published: 10 Aug 2011
|
|
|
Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER:
In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011
|
|
|
Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT:
2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011
|
|
|
3 undeniable use cases for automated IAM controls
sponsored by IBM
WHITE PAPER:
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity.
Posted: 01 Jul 2011 | Published: 03 Jan 2011
|
|
|
Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization
sponsored by HyTrust
CASE STUDY:
With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
Posted: 01 Jul 2011 | Published: 01 Jul 2011
|
|
|
Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure
sponsored by HyTrust
CASE STUDY:
To meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment.
Posted: 01 Jul 2011 | Published: 01 Jul 2011
|
|
|
Case Study: A Major European Development Bank Turns to HyTrust to Virtualize its IT Infrastructure and Enable Secure, Efficient Delivery of Services
sponsored by HyTrust
CASE STUDY:
With a data center structured on aging legacy systems, IT administrators at the Development Bank soon realized that server virtualization, was the key to supporting the bank's long-term goals. Access this exclusive resource for a case study of the Development Bank's implementation of the HyTrust Appliance alongside their virtualization deployment.
Posted: 01 Jul 2011 | Published: 01 Jul 2011
|
|
|
Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities
sponsored by HyTrust
CASE STUDY:
With over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment.
Posted: 01 Jul 2011 | Published: 01 Jul 2011
|
|
|
Oracle Identity Analytics- A Business Perspective
sponsored by Oracle Corporation
WHITE PAPER:
This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
Posted: 13 Jun 2011 | Published: 01 Feb 2010
|
|
|
Wave Methodology- A Practical Guide to Defining Roles for Access Control
sponsored by Oracle Corporation
WHITE PAPER:
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
Posted: 13 Jun 2011 | Published: 10 Jun 2011
|
|
|
AppSense The Low down: What does user virtualization boil down to?
sponsored by AppSense
PRODUCT OVERVIEW:
Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.
Posted: 07 Jun 2011 | Published: 07 Jun 2011
|
|
|
E-Guide: Expert guide to Access Management Services in the Cloud
sponsored by Intel
EGUIDE:
This expert tip takes a look at the steps you can take to utilize cloud services as they become more mainstream and highlights two key architectural and process components of access management services that must be considered in the cloud.
Posted: 26 May 2011 | Published: 26 May 2011
|
|
|
Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD:
Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011
|
|
|
Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD:
Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011
|
|
|
Architecting a vCloud
sponsored by VMware, Inc.
WHITE PAPER:
If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization.
Posted: 20 May 2011 | Published: 20 May 2011
|
|
|
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
sponsored by Intel
PRESENTATION TRANSCRIPT:
User provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
Posted: 20 May 2011 | Published: 20 May 2011
|
|
|
Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
sponsored by Intel
WHITE PAPER:
Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
Posted: 10 May 2011 | Published: 10 May 2011
|
|
|
End-to-End Secure Client to Cloud Access Presentation Transcript
sponsored by Intel
PRESENTATION TRANSCRIPT:
In this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud.
Posted: 06 May 2011 | Published: 06 May 2011
|
|
|
Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER:
Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011
|
|
|
Better Leveraging Active Directory
sponsored by Radiant Logic, Inc.
WHITE PAPER:
Find out how your business can have a better and more efficient identity management system in this white paper.
Posted: 14 Apr 2011 | Published: 13 Apr 2011
|
|
|
Forrester Report: The Total Economic Impact of Oracle Identity Manager
sponsored by Oracle Corporation
ANALYST REPORT:
This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
Posted: 08 Apr 2011 | Published: 03 Nov 2008
|
|
|
Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption
sponsored by Imprivata
WHITE PAPER:
This whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray.
Posted: 07 Apr 2011 | Published: 07 Apr 2011
|
|