Access Control Research
-
Evaluating File Sync and Share Security
Sponsored by: Dropbox for BusinessThis white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
-
Can a Federated Identity Service Strengthen SSO?
Sponsored by: Radiant Logic, Inc.With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
-
Case Study: Globalscape® WAFS Expands the Panama Canal
Sponsored by: GlobalscapeThis case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
How desktop and app virtualization affects IT security
Sponsored by: CitrixThis white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
-
Buyer's Guide: Select the Right Solution for Identity and Access Assurance
Sponsored by: IBMConsult this buyer's guide to help you select the right technology for identity and access assurance -- one that will control access within, across, and between businesses.
-
Managing identities and access in the cloud
Sponsored by: IBMThis white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
-
A Guide to Password Use in WebSphere Application Server
Sponsored by: Global KnowledgeLearn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
-
Definitive Guide to Next Generation Network Access Control
Sponsored by: Forescout Technologies, Inc.This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance.
-
Eagle Bank Keeps Deposits and Customer Data Safe
Sponsored by: ImprivataThis case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
Sponsored by: ImprivataThis case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
A More Secure From Door: SSO and Strong Authentication
Sponsored by: ImprivataThis white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
-
How Desktop Virtualization Simplifies Critical Security Tasks
Sponsored by: CitrixThis white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
Chalk Talk: Simplify User Access with NetIQ Solutions
Sponsored by: NetIQView this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
-
Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
Sponsored by: NetIQThis resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
-
Citrix XenMobile and Cisco ISE Integration
Sponsored by: Cisco Systems, Inc and CitrixThis whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
-
Secure Mobile Devices with a Next Generation Firewall
Sponsored by: Dell SoftwareThis white paper provides one suggestion for securing your mobile devices with a next generation firewall.
-
When Millions Need Access: Identity Management in an Interconnected World
Sponsored by: IBMThis whitepaper covers an automation solution that will allow you to monitor the ever-growing number of access points to your organization's sensitive data.
-
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
Sponsored by: Dell SoftwareThis white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
-
IAM for the Real World – Privileged Account Management
Sponsored by: One IdentityRead this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
-
Manage Identity and Access for Continuous Compliance and Reduced Risk
Sponsored by: IBMThis valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
-
IBM Security Priviledged Identity Management
Sponsored by: IBMThis quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.