IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed   
Wireless Access Control Reports
 
Case Study: Columbia County Sheriff
sponsored by HID Global
CASE STUDY: The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.
Posted: 10 Apr 2019 | Published: 19 Jan 2018

HID Global

Build vs. Buy - Guide to Identity Management
sponsored by Auth0
WHITE PAPER: Learn how you can reap the benefits of an identity management platform, today.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
PODCAST: In this podcast episode with two IAM experts from One Identity, learn more about privileged accounts and how you can block bad actors from accessing your company's data.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

Okera reduces friction for datadriven initiatives with global data access management
sponsored by Okera
RESEARCH CONTENT: In this report from 451 Research, learn how Okera's global data access management platform can help reduce friction in IT enterprise environments with finer grained access controls and increased visibility. Explore Okera's strengths and weaknesses, and decide if a data access platform is right for your organization.
Posted: 20 Jun 2019 | Published: 22 May 2019

Okera

Big Data Analytics - Security and Compliance Challenges in 2019
sponsored by comForte AG
WHITE PAPER: There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.
Posted: 13 May 2019 | Published: 30 Apr 2019

comForte AG

Privileged Account Governance and Incident Response
sponsored by One Identity
WEBCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this webcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

Buyer's Guide: Select the Right Solution for Identity and Access Assurance
sponsored by IBM
WHITE PAPER: Consult this buyer's guide to help you select the right technology for identity and access assurance -- one that will control access within, across, and between businesses.
Posted: 06 May 2014 | Published: 30 Apr 2013

IBM

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Case Study: Globalscape® WAFS Expands the Panama Canal
sponsored by Globalscape
CASE STUDY: This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
Posted: 27 May 2014 | Published: 31 Dec 2013

Globalscape

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement