Access Control Research
-
Stopping Privilege Creep: Limiting User Privileges with Access Reviews
Sponsored by: TechTarget SecurityThis SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
-
Extended Enterprise Poses Identity and Access Management Challenges
Sponsored by: TechTarget SecurityInside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
-
Supporting the Zero Trust Model of Information Security
Sponsored by: IBMThis Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
-
Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
Sponsored by: Celestix NetworksThis guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
-
Identity & Access Management Summit 2014
Sponsored by: GartnerThis brochure is for the Gartner Summit, occurring March 17th – 18th, 2014, where attendees can gain 2 days' worth of valuable content regarding identity and access management (IAM). Click now to learn about the global IT leaders who will discuss strategic trends that will keep businesses protected for years to come.
-
Identity Management: Implementation And System Support
Sponsored by: OpenIAMIn this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
-
IAM Evaluation And Deployment Guidelines
Sponsored by: OpenIAMRead this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
-
Mobilizing Windows Applications
Sponsored by: CitrixThis project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
-
Securing and Controlling Sensitive Data in the Cloud
Sponsored by: Trend MicroThis white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
-
Extending Role Security in Analysis Services for SQL Server
Sponsored by: Global KnowledgeThis step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
-
Cisco Any Device: Planning a Productive, Secure and Competitive Future
Sponsored by: CiscoDiscover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
-
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
Sponsored by: Imperva.This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
-
Fighting Back Against Network Complexity
Sponsored by: InfobloxNetwork management is becoming increasingly difficult, costly and time-consuming. Legacy manual procedures cannot keep up with today's complex networks. Read this white paper to learn why implementing network automation is critical to managing your network.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Strong Authentication: Achieve the Level of Identity Assurance You Need
Sponsored by: HID GlobalIn this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
-
As data grows, so do the risks: How to improve data and app sec
Sponsored by: IBMAccess this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
Avoiding Insider Threats to Enterprise Security
Sponsored by: IBMThis white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
-
Securing Access to the Office 365 Cloud with Two Factor Authentication
Sponsored by: Data3Secure access is a major concern when utilizing cloud-based Office 365, especially since today's users will be logging in from on and off-premises locations. This whitepaper details a 2 factor authentication process with convenient single sign on (SSO) for improved user experience and security.
-
Incorporating Authentication with Imaging and Printing Devices to Improve Data Protection
Sponsored by: Hewlett-Packard EnterpriseThis exclusive paper discusses a security solution that helps protect your company's confidential information and control printing access by requiring users to authenticate at your imaging and printing devices with your existing proximity cards.
-
Okta Active Directory Integration - An Architecture Overview
Sponsored by: OktaThis white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
-
Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
Sponsored by: ADTThis expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
-
How The Burgiss Group Manages Business Risk with AppFirst
Sponsored by: AppFirstThis case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
-
Mitigating Insider Threats
Sponsored by: IBMThis exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
-
Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
Sponsored by: OpenText Security SolutionsThis case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.