Access Control Software Research
-
How to Thwart Privilege Creep with Access Reviews
Sponsored by: TechTarget SecurityIn this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
-
New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
Sponsored by: TechTarget SecurityThis expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
-
Aligning Enterprise Identity and Access Management with CIO Priorities
Sponsored by: TechTarget SecurityIn this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
-
Complete and Scalable Access Management
Sponsored by: Oracle Corporation UK LtdThis comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
-
Achieve secure mobile access to enterprise applications
Sponsored by: Oracle Corporation UK LtdThis brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
-
Oracle Mobile and Social Service: The Next Step in IAM
Sponsored by: Oracle Corporation UK LtdAs cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
-
Information Security Magazine - April 2013
Sponsored by: TechTarget SecurityThis month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
-
Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
Sponsored by: SysAid Technologies LtdThis resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
-
Presentation Transcript: Automating Access Certification in Just 17 Days
Sponsored by: AveksaThis presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
-
Securing Network Access for Guests and Contractors
Sponsored by: Bradford NetworksThis whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
-
The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
Sponsored by: Dell SoftwareIn this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
-
Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization
Sponsored by: HyTrustWith a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
-
Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure
Sponsored by: HyTrustTo meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment.
-
Case Study: A Major European Development Bank Turns to HyTrust to Virtualize its IT Infrastructure and Enable Secure, Efficient Delivery of Services
Sponsored by: HyTrustWith a data center structured on aging legacy systems, IT administrators at the Development Bank soon realized that server virtualization, was the key to supporting the bank's long-term goals. Access this exclusive resource for a case study of the Development Bank's implementation of the HyTrust Appliance alongside their virtualization deployment.
-
Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities
Sponsored by: HyTrustWith over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment.
-
Oracle Identity Analytics- A Business Perspective
Sponsored by: Oracle CorporationThis white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
-
Wave Methodology- A Practical Guide to Defining Roles for Access Control
Sponsored by: Oracle CorporationAs the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
-
AppSense The Low down: What does user virtualization boil down to?
Sponsored by: AppSenseTraditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.
-
Symantec Endpoint Protection Small Business Edition 12
Sponsored by: Symantec CorporationSymantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
-
Buyer’s Guide for Access Management
Sponsored by: Oracle CorporationBombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
-
Help Strengthen Security by Building a Trusted Identity Environment
Sponsored by: IBMAs more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
-
Provide Access Control With Innovative Solutions From IBM
Sponsored by: IBMUnauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
-
E-Book: Best Practices - How to implement and maintain enterprise user roles
Sponsored by: CA TechnologiesEffective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.