Access Control Research
-
The "Hard Truths" About Managing Administrative and Application Identities
Sponsored by: CyberArk Software, IncThis videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
-
Oracle Database Vault
Sponsored by: Oracle CorporationOracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
-
Five Ways to Improve Your Wireless Security
Sponsored by: Cisco Systems, Inc.A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
-
Cisco Secure Remote Access Solution
Sponsored by: Cisco Systems, Inc.This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.
-
Clean VPN Approach to Secure Remote Access
Sponsored by: SonicWALLIn this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security.
-
Citrix GoToMyPCCorporate - Security White Paper
Sponsored by: Citrix Online - GotoMyPCIn this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
-
SAP GRC Access Control Solution
Sponsored by: HCL SoftwareThis white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning.
-
Wholesale Grocer uses CONNX for Data Access, Data Integration and to Enhance Reporting Capabilities
Sponsored by: CONNX SolutionsExplore how a data access and integration solution saved one of North America's oldest wholesale grocers from replacing its ten year old distribution system and spending up to five million dollars on a brand new enterprise solution.
-
Facilitating Enterprise PCI DSS Compliance - Executive Summary
Sponsored by: GlobalscapeThe GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements.
-
Facilitating Enterprise PCI DSS Compliance - Detail Review
Sponsored by: GlobalscapeHS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings.
-
Transform the Internet into a Business- Ready Application Delivery Platform for Enterprise SOA Based SAP Deployments
Sponsored by: Akamai TechnologiesFor today's enterprises, enterprise SOA based on SAP and the Internet provide a complementary and highly agile platform for rapidly extending the enterprise to reach customers, partners and employees in markets globally.
-
Five Ways to Improve Your Company's Efficiency
Sponsored by: Cisco Systems, Inc.According to IDC research, 60.2% of SMBs cited improving efficiency as their top business priority in 2005. Read this article to find tips for enhancing efficiency.
-
Niksun Central Manager Data Sheet
Sponsored by: NIKSUNNIKSUN Central Manager is a Web-based application that provides services to remotely manage NIKSUN appliances.
-
Niksun NetDetector Data Sheet
Sponsored by: NIKSUNNetDetector seamlessly integrates with other NIKSUN products, 3rd-party applications and network devices to provide a rock-solid security solution.
-
Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications
Sponsored by: Paymetric, Inc.Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.
-
Effectively manage access to systems and information to help optimize integrity and facilitate compliance
Sponsored by: IBM Software GroupConsistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
-
Drive business value with innovation for security defense
Sponsored by: IBMThis white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
-
Methods, Motivations, and Mitigation of Insider Threats
Sponsored by: VeriSign, IncThis white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
-
Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance
Sponsored by: IBMThis paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...
-
DePaul University Case Study
Sponsored by: SonicWALLIn this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
-
Potomac Hospital Case Study
Sponsored by: SonicWALLIn this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
-
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
Sponsored by: SonicWALLSSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
-
Remote Replication of an Oracle 10g Database Using Continuous Access/EVA
Sponsored by: Hewlett Packard EnterpriseView this Webcast to learn best practices for deploying remote replication of an Oracle database. Discover how to properly manage replication so it will positively affect database performance.
-
DatAdvantage: Comprehensive Data Governance
Sponsored by: VaronisThis paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...
-
DataPrivilege: Entitlement Management Where It Belongs - With Business Owners
Sponsored by: VaronisIn most enterprise business environments the IT personnel controls the permission settings on data; however, they are not as familiar with the information as the original data creator. Find out how you can keep data permission control in the right ...