Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed   
Resource Access Control Facility Reports
 
Modern Security Solutions for the Mainframe
sponsored by Beta Systems
WHITE PAPER: Jump into this white paper to learn how to identify and plug system security vulnerabilities in your z/OS environments by comparing your current RACF settings to industry standards as defined by Security Technical Implementation Guides.
Posted: 22 Jan 2020 | Published: 22 Jan 2020

Beta Systems

Simplified RACF Management
sponsored by Beta Systems
DATA SHEET: Access this data sheet from Beta Systems to learn about _beta access for RACF, a solution that delivers simple administration, monitoring, and auditing of your z/OS security system, replacing the costly tools you use today while providing the same functionality.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Beta Systems

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

Overcoming the Legacy VPN Dilemma: Zero-Trust Access with Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access models enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Forcepoint

SASE & the Forces Shaping Digital Transformation
sponsored by Netskope
RESOURCE: With the rise of of digital transformation, SASE, and the continuing effects of the COVID-19 pandemic, there are key forces that security practitioners need to be aware of. This blog outlines and details how security leaders can adapt to these key forces in a digitally transforming, SASE-enabled world – read on to get started.
Posted: 12 Jan 2021 | Published: 05 Nov 2020

Netskope

Fortinet FortiGate: Bridging the cloud security gap
sponsored by Fortinet, Inc.
VIDEO: Cloud adoption is on the rise, and organizations need to ensure they’re scaling without compromising efficiency, reliability, security or control. Watch this short video to see how Fortinet is helping organization bridge this gap.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Fortinet, Inc.

Microsoft Cloud Accelerator Workshop
sponsored by Insight
VIDEO: In order to realize the full benefits of Microsoft 365, Microsoft offers a number of workshops designed to be a deep dive into a specific functionality or capability. Watch this short video for an overview of what’s covered in the cloud, remote work, compliance and security workshops.
Posted: 08 Jan 2021 | Premiered: 08 Jan 2021

Insight

AT&T Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET: Threat detection is one of the fastest-growing areas in cybersecurity, but talent is in short supply, leaving organizations to do more with less resources. And as cybercriminals become cleverer, the burden falls to the business to counter threats. Examine this data sheet to explore Managed Threat Detection and Response from AT&T.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

AT&T Cybersecurity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info