IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Privileges

RSS Feed   
Privileges Reports
 
NIST SP 800-171 and CUI
sponsored by TITUS
PRODUCT OVERVIEW: NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be compliant with DFARS Part 252.204-7012. In this solution brief, learn how Titus can help contractors comply with these requirements.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

TITUS

Making the Business Case for Zero Trust Access
sponsored by PortSys
RESOURCE: Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.
Posted: 27 Sep 2019 | Published: 07 Jun 2019

PortSys

WLAN Access Control and Wi-Fi Network Needs
sponsored by SearchSecurity.com
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

SearchSecurity.com

Establish Secure DevOps Practices
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

How to Know It’s Time to Change Your Identity Vendor
sponsored by SailPoint Technologies
WHITE PAPER: Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

SailPoint Technologies

Guide to Mobile Device Management Software
sponsored by SearchSecurity.com
EGUIDE: This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

SearchSecurity.com

Take a Better TAC to Protect RDP
sponsored by PortSys
RESOURCE: Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info