Access Control Research
-
Oracle Identity Analytics- A Business Perspective
Sponsored by: Oracle CorporationThis white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
-
E-Guide: Evaluating IaaS security risks
Sponsored by: TechTarget SecurityThis expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that need to be considered in the cloud.
-
AppSense The Low down: What does user virtualization boil down to?
Sponsored by: AppSenseTraditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.
-
E-Guide: Expert guide to Access Management Services in the Cloud
Sponsored by: IntelThis expert tip takes a look at the steps you can take to utilize cloud services as they become more mainstream and highlights two key architectural and process components of access management services that must be considered in the cloud.
-
Symantec Endpoint Protection Small Business Edition 12
Sponsored by: Symantec CorporationSymantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
-
Symantec Endpoint Protection 12
Sponsored by: Symantec CorporationSymantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
-
Architecting a vCloud
Sponsored by: VMware, Inc.If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization.
-
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
Sponsored by: IntelUser provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
Sponsored by: IntelTraditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
-
End-to-End Secure Client to Cloud Access Presentation Transcript
Sponsored by: IntelIn this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud.
-
Buyer’s Guide for Access Management
Sponsored by: Oracle CorporationBombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
-
Better Leveraging Active Directory
Sponsored by: Radiant Logic, Inc.Find out how your business can have a better and more efficient identity management system in this white paper.
-
Forrester Report: The Total Economic Impact of Oracle Identity Manager
Sponsored by: Oracle CorporationThis report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
-
Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption
Sponsored by: ImprivataThis whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray.
-
E-Guide: Uniting SIM and IAM to Boost Security
Sponsored by: TechTarget SecurityWhen logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
-
April Issue of Information Security Magazine: Cloud Migration: Look before you leap
Sponsored by: Information Security MagazineThis month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.
-
Adaptive Access Management: An ROI Study
Sponsored by: Oracle CorporationSecurity solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.
-
Simplify Security for REST and WS* Web Services: The Gateway Approach
Sponsored by: IntelThis solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
-
Wireless LAN Management Solution Overview
Sponsored by: Juniper Networks, Inc.Juniper Networks Wireless LAN Management portfolio helps network managers and administrators oversee and control both the WLAN infrastructure and its mobility services.
-
Tackling the Top Five Network Access Control Challenges
Sponsored by: Juniper Networks, Inc.In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
-
E-Guide: How to tie SIM to identity management for security effectiveness
Sponsored by: TechTarget SecuritySecurity information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
-
Forrester Study: The Total Economic Impact of Oracle Identity Analytics
Sponsored by: Oracle CorporationBased on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution.
-
Smart Strategies for Securing Extranet Access
Sponsored by: Oracle CorporationDownload this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies.
-
Access Certification: Addressing and Building on a Critical Security Control
Sponsored by: Oracle CorporationThis white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
-
Presentation Transcript: Changing Authentication Options
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.