IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed   
Wireless Access Control Reports
 
Building a Smart City Starts with Security
sponsored by One Identity
CASE STUDY: Smart-city technologies support exciting innovations while improving quality of life for citizens. But, with more sensors collecting data in the field, comes greater security risks. Find out how one city was able to develop their smart capabilities while mitigating security risks.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

6 Pillars of Big Data: How to Harness Data with Tableau
sponsored by Tableau Software
WHITE PAPER: Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of a big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Tableau Software

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

How to Protect Privileged Accounts with an Incident Response Plan
sponsored by Thycotic
RESOURCE: Today, cybercriminals can create a blueprint of the entire network and operations. Discover the telltale indicators you're under attack and the plans you need to have in place to protect your privileged accounts.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Thycotic

Buyer's Guide: Select the Right Solution for Identity and Access Assurance
sponsored by IBM
WHITE PAPER: Consult this buyer's guide to help you select the right technology for identity and access assurance -- one that will control access within, across, and between businesses.
Posted: 06 May 2014 | Published: 30 Apr 2013

IBM

Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.

Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency
sponsored by FinalCode
WHITE PAPER: Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.
Posted: 05 Oct 2015 | Published: 30 Apr 2015

FinalCode

DataWorks Solution Brief
sponsored by IBM
WHITE PAPER: 42% of business professionals spend more than 40% of their time fixing and validatiing data before analyzing it. With increasing amounts of data coming from new technologies, this is a major pain point. Read on to learn about a solution that delivers data quality and easy access for business users.
Posted: 09 Jun 2016 | Published: 31 Dec 2015

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Build vs Buy: Dynamic Authorization Solutions
sponsored by Axiomatics
WHITE PAPER: Download this review, for an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.
Posted: 12 Jun 2018 | Published: 12 Jun 2018

Axiomatics
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement