ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Oracle Identity Analytics- A Business Perspective

    Sponsored by: Oracle Corporation

    This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.

  • E-Guide: Evaluating IaaS security risks

    Sponsored by: TechTarget Security

    This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that need to be considered in the cloud.

  • AppSense The Low down: What does user virtualization boil down to?

    Sponsored by: AppSense

    Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.

  • E-Guide: Expert guide to Access Management Services in the Cloud

    Sponsored by: Intel

    This expert tip takes a look at the steps you can take to utilize cloud services as they become more mainstream and highlights two key architectural and process components of access management services that must be considered in the cloud.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Architecting a vCloud

    Sponsored by: VMware, Inc.

    If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization.

  • Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control

    Sponsored by: Intel

    User provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk.  Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.

  • Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

    Sponsored by: Intel

    Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.

  • End-to-End Secure Client to Cloud Access Presentation Transcript

    Sponsored by: Intel

    In this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud.

  • Buyer’s Guide for Access Management

    Sponsored by: Oracle Corporation

    Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.

  • Better Leveraging Active Directory

    Sponsored by: Radiant Logic, Inc.

    Find out how your business can have a better and more efficient identity management system in this white paper.

  • Forrester Report: The Total Economic Impact of Oracle Identity Manager

    Sponsored by: Oracle Corporation

    This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.

  • Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption

    Sponsored by: Imprivata

    This whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray.

  • E-Guide: Uniting SIM and IAM to Boost Security

    Sponsored by: TechTarget Security

    When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.

  • April Issue of Information Security Magazine: Cloud Migration: Look before you leap

    Sponsored by: Information Security Magazine

    This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.

  • Adaptive Access Management: An ROI Study

    Sponsored by: Oracle Corporation

    Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.

  • Simplify Security for REST and WS* Web Services: The Gateway Approach

    Sponsored by: Intel

    This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.

  • Wireless LAN Management Solution Overview

    Sponsored by: Juniper Networks, Inc.

    Juniper Networks Wireless LAN Management portfolio helps network managers and administrators oversee and control both the WLAN infrastructure and its mobility services.

  • Tackling the Top Five Network Access Control Challenges

    Sponsored by: Juniper Networks, Inc.

    In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each

  • E-Guide: How to tie SIM to identity management for security effectiveness

    Sponsored by: TechTarget Security

    Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.

  • Forrester Study: The Total Economic Impact of Oracle Identity Analytics

    Sponsored by: Oracle Corporation

    Based on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution.

  • Smart Strategies for Securing Extranet Access

    Sponsored by: Oracle Corporation

    Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies.

  • Access Certification: Addressing and Building on a Critical Security Control

    Sponsored by: Oracle Corporation

    This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.

  • Presentation Transcript: Changing Authentication Options

    Sponsored by: ActivIdentity Corporation

    Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.