Access Control Research
-
Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
Sponsored by: Dell SoftwareLearn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
-
Safe & Secure: An Overview of Security Features In JBoss Application Platforms
Sponsored by: Red HatSecurity is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
-
E-Book: Best Practices - How to implement and maintain enterprise user roles
Sponsored by: CA TechnologiesEffective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.
-
Securing Virtualised Environments and Accelerating Cloud Computing
Sponsored by: CA TechnologiesThere is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.
-
Privileged user management: It's time to take control
Sponsored by: CA TechnologiesIT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.
-
Improving Identity and Access Management in an SAP Environment
Sponsored by: Dell SoftwareIn this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
-
Networking for Sustainability: The Network Offset Effect
Sponsored by: AT&T CorpBuilding on recommendations in the Global e-Sustainability Initiative (GeSI) SMART 2020 report, this paper explains how companies can replace high environmental impact activities with low carbon alternatives through the network. The result? Efficiencies in workplaces, data centers, transportation and logistics, power grids and buildings.
-
Making the Right Move to a Managed Service Provider for SSL VPN
Sponsored by: MegaPath Inc.Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.
-
Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’
Sponsored by: Information Security MagazineThis month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.
-
Managing Identities and Access Control
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
-
Realizing Business Value with Identity and Access Management
Sponsored by: IBMRead this white paper to learn how IBM identity and access management solutions help organizations realize business value through a centralized, automated identity and access management infrastructure.
-
Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
Sponsored by: Dell SoftwareThis tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
-
Role Based Access Control and Entitlement Management
Sponsored by: FoxTThe new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.
-
Buyer’s Guide for Enterprise Single Sign-On
Sponsored by: Oracle CorporationThis whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance.
-
Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
Sponsored by: Symantec CorporationThis paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
-
Authentication in the Enterprise: Current and Changing Requirements
Sponsored by: PistolStar, Inc.This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
-
Database Crime Scene Prevention
Sponsored by: ImpervaThis article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.
-
An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
Sponsored by: Ping Identity CorporationCheck out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
-
Entitlement Reviews: A Practitioner's Guide
Sponsored by: VaronisThis document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data.
-
Fixing the "Everyone" Problem
Sponsored by: VaronisRead this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
-
Protecting SharePoint Data Long Term
Sponsored by: VaronisThis paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.
-
Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
Sponsored by: Shavlik TechnologiesThis Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
-
Information Security Magazine, July 09: Controlling Privileged Accounts
Sponsored by: Information Security MagazineThis month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
Presentation Transcript: The Economics of Endpoint Security
Sponsored by: Sophos UKCheck out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.
-
SharePoint E-Zine Volume 11: Managing Documents By Content Type
Sponsored by: TechTarget Search Windows ServerSharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...