ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • IT in Europe - May 2012

    Sponsored by: TechTarget Security

    While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

  • The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD

    Sponsored by: TechTarget Security

    Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.

  • IT Handbook : Smartphones & Tablets in the Enterprise

    Sponsored by: TechTarget Security

    This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.

  • Expert Tips for Managing Mobile Devices in the Enterprise

    Sponsored by: TechTarget Security

    Get expert tips for managing the mobile device explosion in the enterprise, and also learn about the brave new work of enterprise device management.

  • E-Guide: Securing the SIEM system: Control access, prioritize availability

    Sponsored by: TechTarget Security

    Given the vital role a security information and event management (SIEM) system plays in an organization’s security infrastructure, a compromised or crashed system can mean devastating consequences. This e-guide explores the serious implications of a corrupted SIEM system and offers helpful tips on how to secure them.

  • E-Guide: Achieving compliance through IAM

    Sponsored by: TechTarget Security

    Read this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations.

  • E-Guide: IAM in the cloud

    Sponsored by: TechTarget Security

    When bringing your organization into the cloud, there are a few steps that need to be taken in order to ensure security. One of the main areas that needs to be appropriately integrated is identity management. Read this expert E-Guide and discover how to manage identity in the cloud, along with whom and what you can trust in the cloud.

  • Pharmaceutical Services Company Accelerates Virtual Desktops

    Sponsored by: Cisco Systems, Inc.

    This case study demonstrates how Quintiles Pharmaceutical Services extended WAN optimization to 100 percent of their virtual desktop infrastructure and improved traffic flow with their existing bandwidth, allowing for secure and centralized data and access control, and high levels of employee satisfaction.

  • Closing the Loop for Effective Network Operations Management Webcast

    Sponsored by: Cisco Systems, Inc.

    This webcast explores the need for operational efficiency in the modern enterprise and why network monitoring and management is so vital. View now to uncover details of a portfolio of networking products that can help you with network visibility, troubleshooting, and more!

  • B.Y.O.D Without the Risk

    Sponsored by: Juniper Networks, Inc.

    As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.

  • Wireless LANs and Multimedia: Matching wired network performance and quality

    Sponsored by: TechTarget Security

    The June edition of SearchNetworking.com’s Network Evolution E-Zine outlines the three basic steps enterprises should follow when preparing for video. Uncover how to integrate these steps into your network plans and learn how to say goodbye to your troubles with video.

  • Mobilize to Rightsize Your Network

    Sponsored by: Aruba Networks

    Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!

  • The Threat Within: The Case for Zero Trust Access Control

    Sponsored by: Xceedium

    It's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.

  • University of the Sunshine Coast Improves Security with Sentinel

    Sponsored by: NetIQ

    Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security.

  • Enterprise Single Sign On

    Sponsored by: tools4ever

    With organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.

  • Five Best Practices to Protect Your Virtual Environment

    Sponsored by: Juniper Networks, Inc.

    Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment.

  • Active Directory Maintenance & Cleanup

    Sponsored by: STEALTHbits Technologies

    Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.

  • Cloud Identity Buyer’s Guide

    Sponsored by: Intel

    This guide discusses the issue of identity and access management (IAM) for cloud applications. It outlines the issues that need to be addressed, suggests some approaches to solving those issues and provides an overview of the Intel products that help companies manage their SaaS application identities more effectively and efficiently.

  • Network Evolution E-Zine: Network security in a world of mobile workers

    Sponsored by: TechTarget Networking

    In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.

  • The Intelligent Campus LAN

    Sponsored by: Juniper Networks, Inc.

    Access this Tech Guide from SearchNetworking.com to learn how you can update your campus LAN to address the modern needs of your network, including application delivery and mobility.

  • Beverly Hills Wealth Management Case Study

    Sponsored by: Intel

    Read this case study and learn how and why Beverly Hills Wealth Management, a Registered Investment Advisor Firm, selected Intel's Identity and Access Management Solution that combines single sign-on, user account provisioning/deprovisioning, and access management for its users.

  • Infrastructure, Interrupted: Apple in the Enterprise Redefined

    Sponsored by: Acronis

    Learn more about the evolution of Apple in the enterprise and how you can make shifting standards and multiple platforms work together to benefit your organization.

  • Securing Today’s Mobile Workforce

    Sponsored by: Juniper Networks, Inc.

    BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

  • Understanding, Building and Securing an IAM Cloud Architecture

    Sponsored by: OneLogin

    This presentation transcript will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.

  • Securing Network Access for Guests and Contractors

    Sponsored by: Bradford Networks

    This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.