ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?

    Sponsored by: Dell Software

    Learn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.

  • Safe & Secure: An Overview of Security Features In JBoss Application Platforms

    Sponsored by: Red Hat

    Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.

  • E-Book: Best Practices - How to implement and maintain enterprise user roles

    Sponsored by: CA Technologies

    Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.

  • Securing Virtualised Environments and Accelerating Cloud Computing

    Sponsored by: CA Technologies

    There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.

  • Privileged user management: It's time to take control

    Sponsored by: CA Technologies

    IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.

  • Improving Identity and Access Management in an SAP Environment

    Sponsored by: Dell Software

    In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.

  • Networking for Sustainability: The Network Offset Effect

    Sponsored by: AT&T Corp

    Building on recommendations in the Global e-Sustainability Initiative (GeSI) SMART 2020 report, this paper explains how companies can replace high environmental impact activities with low carbon alternatives through the network. The result? Efficiencies in workplaces, data centers, transportation and logistics, power grids and buildings.

  • Making the Right Move to a Managed Service Provider for SSL VPN

    Sponsored by: MegaPath Inc.

    Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity.

  • Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’

    Sponsored by: Information Security Magazine

    This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  • Managing Identities and Access Control

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

  • Realizing Business Value with Identity and Access Management

    Sponsored by: IBM

    Read this white paper to learn how IBM identity and access management solutions help organizations realize business value through a centralized, automated identity and access management infrastructure.

  • Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment

    Sponsored by: Dell Software

    This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.

  • Role Based Access Control and Entitlement Management

    Sponsored by: FoxT

    The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.

  • Buyer’s Guide for Enterprise Single Sign-On

    Sponsored by: Oracle Corporation

    This whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance.

  • Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It

    Sponsored by: Symantec Corporation

    This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.

  • Authentication in the Enterprise: Current and Changing Requirements

    Sponsored by: PistolStar, Inc.

    This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.

  • Database Crime Scene Prevention

    Sponsored by: Imperva

    This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Sponsored by: Ping Identity Corporation

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

  • Entitlement Reviews: A Practitioner's Guide

    Sponsored by: Varonis

    This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data.

  • Fixing the "Everyone" Problem

    Sponsored by: Varonis

    Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.

  • Protecting SharePoint Data Long Term

    Sponsored by: Varonis

    This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.

  • Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed

    Sponsored by: Shavlik Technologies

    This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.

  • Information Security Magazine, July 09: Controlling Privileged Accounts

    Sponsored by: Information Security Magazine

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  • Presentation Transcript: The Economics of Endpoint Security

    Sponsored by: Sophos UK

    Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.

  • SharePoint E-Zine Volume 11: Managing Documents By Content Type

    Sponsored by: TechTarget Search Windows Server

    SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.