ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Software Research

  • Identity and Access Management Security Live Chat Transcript

    Sponsored by: SailPoint Technologies

    In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Build Your Identity And Access Management Strategy

    Sponsored by: Symplified

    This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.

  • Complete and Scalable Access Management

    Sponsored by: Oracle Corporation UK Ltd

    This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.

  • Achieve secure mobile access to enterprise applications

    Sponsored by: Oracle Corporation UK Ltd

    This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.

  • Oracle Mobile and Social Service: The Next Step in IAM

    Sponsored by: Oracle Corporation UK Ltd

    As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.

  • How to Thwart Privilege Creep with Access Reviews

    Sponsored by: TechTarget Security

    In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.

  • Information Security Magazine - April 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop

    Sponsored by: SysAid Technologies Ltd

    This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.

  • Presentation Transcript: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.

  • Securing Network Access for Guests and Contractors

    Sponsored by: Bradford Networks

    This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.

  • The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach

    Sponsored by: Dell Software

    In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.

  • Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization

    Sponsored by: HyTrust

    With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.

  • Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure

    Sponsored by: HyTrust

    To meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment.

  • Case Study: A Major European Development Bank Turns to HyTrust to Virtualize its IT Infrastructure and Enable Secure, Efficient Delivery of Services

    Sponsored by: HyTrust

    With a data center structured on aging legacy systems, IT administrators at the Development Bank soon realized that server virtualization, was the key to supporting the bank's long-term goals. Access this exclusive resource for a case study of the Development Bank's implementation of the HyTrust Appliance alongside their virtualization deployment.

  • Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities

    Sponsored by: HyTrust

    With over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment.

  • Wave Methodology- A Practical Guide to Defining Roles for Access Control

    Sponsored by: Oracle Corporation

    As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.

  • Oracle Identity Analytics- A Business Perspective

    Sponsored by: Oracle Corporation

    This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.

  • AppSense The Low down: What does user virtualization boil down to?

    Sponsored by: AppSense

    Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Buyer’s Guide for Access Management

    Sponsored by: Oracle Corporation

    Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.

  • Help Strengthen Security by Building a Trusted Identity Environment

    Sponsored by: IBM

    As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.

  • Provide Access Control With Innovative Solutions From IBM

    Sponsored by: IBM

    Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.

  • E-Book: Best Practices - How to implement and maintain enterprise user roles

    Sponsored by: CA Technologies

    Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.

  • PowerTerm WebConnect - Free 30 Day Trial!

    Sponsored by: Ericom Software

    PowerTerm WebConnect enhances the flexibility and reliability of Microsoft Terminal Servers, Virtual Desktops and Blade PCs. More flexible, affordable and easier to deploy and extend throughout the organization,  Ericom's centrally administered solution installs and deploys in hours making it an ideal application for mobile workforces.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.