Access Control Research
-
Creating a Network Endpoint Security Policy for Hostile Endpoints
Sponsored by: TechTarget SecurityDiscover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
-
BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
Sponsored by: TechTarget SecurityBYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
-
Keeping Up With Network Needs: Five WLAN Questions Answered
Sponsored by: TechTarget SecurityIn this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
-
WLAN Planning For BYOD
Sponsored by: TechTarget SecurityThis E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
-
Updating Your Corporate BYOD Program for Success
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
-
Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
Sponsored by: TechTarget SecurityBYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
-
Securing Data, Not Endpoints: The Best Way to Control Consumerization
Sponsored by: TechTarget SecurityDiscover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
-
Guide to Mobile Device Management Software
Sponsored by: TechTarget SecurityThis expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
-
Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements
Sponsored by: IBM and SI ArchitectsThis expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.
-
DNS Firewalls and Defense Tactics
Sponsored by: InfobloxGain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
-
Application Delivery and Optimization Solutions Spotlight- Checklist #1
Sponsored by: TechTarget NetworkingIn the first of SearchEnterpriseWAN.com's three-part guide on selecting application delivery optimization (ADO) solutions, get help assessing the business and technology issues surrounding these products and uncover the benefits they can bring your organization.
-
Security in Cloud Computing
Sponsored by: CSCThis expert E-Guide explores the hesitations preventing many from moving to the cloud and offers considerations to keep in mind when using external CSPs for your security needs.
-
Cloud Costs and Management Considerations
Sponsored by: CSCThis expert E-Guide provides considerations you should keep in mind when moving to the cloud – especially when it comes to security and risk tolerance – and offers expert advice on how to foster cloud adoption in your enterprise.
-
Mobile NFC in Transport
Sponsored by: TechTarget ComputerWeekly.comThis in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
-
Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
Sponsored by: Tripwire, Inc.View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
-
Presentation Transcript: Confidential Documents at Risk
Sponsored by: WatchDoxUncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
-
Recommended Best Security Practices for Unified Communications
Sponsored by: Polycom, Inc.Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
-
Beyond Passwords & Outdated Physical Access Systems
Sponsored by: Entrust, Inc.Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
-
Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
Sponsored by: SysAid Technologies LtdThis resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
-
Two-factor Authentication: A Tokenless Approach
Sponsored by: PortalGuardLearn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
-
Presentation Transcript: Automating Access Certification in Just 17 Days
Sponsored by: AveksaThis presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
-
The Ten "Must Haves" for Secure Mobile Device Management
Sponsored by: ZenpriseUncover the risks mobile devices bring to your enterprise and how an end-to-end mobile security framework can help you monitor, control, and protect the devices accessing your network and corporate data and applications.
-
Business-Driven Identity and Access Management: Why This New Approach Matters
Sponsored by: AveksaThis informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
-
Provisioning Should Be Simple Why Traditional Provisioning Systems Are No Longer Relevant
Sponsored by: AveksaDo you want to improve your provisioning system? In the past provisioning has been expensive and ineffective, but that can all improve with a few changes. Deciding who has access to your business enterprise is one of the first steps to take towards improvement.
-
Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
Sponsored by: CiscoDiscover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.