Access Control Research
-
Maintaining security in managed services
Sponsored by: TechTarget SecuritySecurity management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.
-
E-Guide: Are 'strong authentication' methods strong enough for compliance?
Sponsored by: TechTarget SecurityAlthough strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
-
Securing the enterprise application layer: Expert Guidelines
Sponsored by: TechTarget SecurityIf you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation. Find out how securing a naming and directory service will help build a solid platform that application can trust.
-
E-Guide: Wireless LAN access control: Managing users and their devices
Sponsored by: TechTarget SecurityThis expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
-
E-Guide: Preventing and detecting security vulnerabilities in Web applications
Sponsored by: TechTarget SecurityThe extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.
-
Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements
Sponsored by: StrikeForce TechnologiesDiscover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.
-
IT in Europe: Breaking the Code: Are passwords destined for obscurity?
Sponsored by: TechTarget ComputerWeekly.comThis feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
-
Top 10 Tips to Make Access to SaaS, Enterprise Class Secure
Sponsored by: IntelIn today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.
-
The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
Sponsored by: IntelCloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
-
E-Guide: Minimize enterprise data exposure inside and outside the organization
Sponsored by: IBMThis expert e-guide provides data masking best practices and explains how to implement an effective strategy for reducing the risk of data exposure from inside and outside the organization.
-
Five Critical Rules for Firewall Management
Sponsored by: Dell SecureWorksThis white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
-
The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
Sponsored by: Dell SoftwareIn this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
-
SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know
Sponsored by: IBMToo many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data.
-
SearchSecurity.com E-Guide: The critical role of privileged account management in data security
Sponsored by: IBMPrivileged accounts are extremely difficult to secure and now represent the biggest threat to today’s enterprises. This expert tip discusses the technology and strategies available to help organizations take better control over privileged accounts.
-
InfoSphere Optim Data Redaction
Sponsored by: IBMAs data continues to expand and organizations find new ways to collaborate with partners and customers, the question arises: How secure is your sensitive information? In addition, organizations must also ensure that the right information stays private. Learn how organizations are striving to support information governance programs.
-
Understanding Advanced Virtualization Security Practices
Sponsored by: IntelSearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.
-
E-Guide: IAM - Key concepts and predictions for 2011
Sponsored by: CA TechnologiesThis expert e-guide discusses key trends that will significantly impact identity and access management concepts in 2011, and highlights the critical questions any organization must ask when selecting an IAM product.
-
Choosing a Cloud Provider with Confidence
Sponsored by: GeoTrust, Inc.In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
-
Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
Sponsored by: HyTrust2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
-
3 undeniable use cases for automated IAM controls
Sponsored by: IBMThis white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity.
-
Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization
Sponsored by: HyTrustWith a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
-
Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure
Sponsored by: HyTrustTo meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment.
-
Case Study: A Major European Development Bank Turns to HyTrust to Virtualize its IT Infrastructure and Enable Secure, Efficient Delivery of Services
Sponsored by: HyTrustWith a data center structured on aging legacy systems, IT administrators at the Development Bank soon realized that server virtualization, was the key to supporting the bank's long-term goals. Access this exclusive resource for a case study of the Development Bank's implementation of the HyTrust Appliance alongside their virtualization deployment.
-
Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities
Sponsored by: HyTrustWith over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment.
-
Oracle Identity Analytics- A Business Perspective
Sponsored by: Oracle CorporationThis white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.