Access Control Research
-
Best Practices for Managing and Understanding Mobile Authentication
Sponsored by: TechTarget SecurityIn this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
-
How to tackle cloud, IAM, and digital certificate problems in your organization
Sponsored by: TechTarget SecurityIn this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise.
-
Rethink Defense-In-Depth Security Model For BYOD
Sponsored by: TechTarget SecurityThis e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
-
WLAN Access Control and Wi-Fi Network Needs
Sponsored by: TechTarget SecurityThis white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
-
How to Thwart Privilege Creep with Access Reviews
Sponsored by: TechTarget SecurityIn this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
-
Considerations and Best Practices for Updating a Corporate BYOD Program
Sponsored by: TechTarget SecurityIn this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
-
Handbook: Identity and Access Management
Sponsored by: TechTarget SecurityIn this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
-
Global Security University: IAM Integration Classroom
Sponsored by: IBMThis Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
Identity and Access Management Buyer's Guide
Sponsored by: IBMThis buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
-
Network Rightsizing Blueprint for the Next-Generation Workplace
Sponsored by: Aruba NetworksThis resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.
-
Is Your Platform Secure? Really?
Sponsored by: IBMThis resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
-
What you didn’t know about Certificate-Based Authentication
Sponsored by: OpenTrustYou may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
-
Dell Mobile Clinical Computing - AlwaysOn Point of Care
Sponsored by: Dell and VMwareThis resource discusses why modernization of the point-of-care desktop has become an urgent health IT priority. Inside, learn how the right virtualization architecture can give caregivers the information access and protection that they need.
-
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Sponsored by: Dell SecureWorksUncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
-
Securing SharePoint: SharePoint Security Best Practices
Sponsored by: Thawte Inc.This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more.
-
Identity and Access Management Security Live Chat Transcript
Sponsored by: SailPoint TechnologiesIn this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
-
Sophos EndUser Protection Overview
Sponsored by: SophosThis two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
-
Gartner Magic Quadrant for Unified Threat Management
Sponsored by: SophosRead an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
-
Complete and Scalable Access Management
Sponsored by: Oracle Corporation UK LtdThis comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
-
Achieve secure mobile access to enterprise applications
Sponsored by: Oracle Corporation UK LtdThis brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
-
Oracle Mobile and Social Service: The Next Step in IAM
Sponsored by: Oracle Corporation UK LtdAs cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
-
Information Security Magazine - April 2013
Sponsored by: TechTarget SecurityThis month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.