ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Software Research

  • PowerTerm WebConnect - Free 30 Day Trial!

    Sponsored by: Ericom Software

    PowerTerm WebConnect enhances the flexibility and reliability of Microsoft Terminal Servers, Virtual Desktops and Blade PCs. More flexible, affordable and easier to deploy and extend throughout the organization,  Ericom's centrally administered solution installs and deploys in hours making it an ideal application for mobile workforces.

  • Securing Virtualised Environments and Accelerating Cloud Computing

    Sponsored by: CA Technologies

    There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.

  • Privileged user management: It's time to take control

    Sponsored by: CA Technologies

    IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.

  • Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment

    Sponsored by: Dell Software

    This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.

  • Fixing the "Everyone" Problem

    Sponsored by: Varonis

    Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.

  • eGuide: Essential Guide to Identity & Access Management

    Sponsored by: Information Security Magazine

    This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.

  • Closing the Gaps in Root Access Control

    Sponsored by: BeyondTrust Corporation

    Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.

  • Presentation Transcript: Accelerating Return-On-Investment with Roles Management

    Sponsored by: Oracle Corporation

    This paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations.

  • HP Virtual Desktop Infrastructure with Citrix XenDesktop

    Sponsored by: Citrix and HP

    The HP and Citrix solution offers you the functionality of a stand-alone desktop, while enabling unified management of both physical and virtual infrastructures from the same centralized console.

  • The "Hard Truths" About Managing Administrative and Application Identities

    Sponsored by: CyberArk Software, Inc

    This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.

  • Readers' Choice Awards

    Sponsored by: Information Security Magazine

    Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.

  • Building a Secure and Compliant Windows Desktop

    Sponsored by: BeyondTrust Corporation

    Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.

  • Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All

    Sponsored by: SonicWALL

    SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.

  • On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck

    Sponsored by: Dell Software

    Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.

  • A Pathway to PCI Compliance

    Sponsored by: Imprivata

    This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.

  • Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System

    Sponsored by: Forescout Technologies, Inc.

    Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.

  • Network Access Protection: New Ways to Keep Your Network Healthy

    Sponsored by: Global Knowledge

    Learn how Network Access Protection (NAP) operates to isolate non-compliant or infected computers from the network until corrective measures can be taken.

  • Authentication Tokens: The Key to Secure PCs and Data

    Sponsored by: Aladdin Knowledge Systems

    This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.

  • Internet Security and Acceleration Server 2006

    Sponsored by: Microsoft

    ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.