Access Rights Research
-
Best Practices for Managing and Understanding Mobile Authentication
Sponsored by: TechTarget SecurityIn this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
-
WLAN Access Control and Wi-Fi Network Needs
Sponsored by: TechTarget SecurityThis white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
-
How to Thwart Privilege Creep with Access Reviews
Sponsored by: TechTarget SecurityIn this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
-
New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
Sponsored by: TechTarget SecurityThis expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
-
Aligning Enterprise Identity and Access Management with CIO Priorities
Sponsored by: TechTarget SecurityIn this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.
-
Considerations and Best Practices for Updating a Corporate BYOD Program
Sponsored by: TechTarget SecurityIn this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
-
Creating a Network Endpoint Security Policy for Hostile Endpoints
Sponsored by: TechTarget SecurityDiscover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
-
BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
Sponsored by: TechTarget SecurityBYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
-
Keeping Up With Network Needs: Five WLAN Questions Answered
Sponsored by: TechTarget SecurityIn this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
-
WLAN Planning For BYOD
Sponsored by: TechTarget SecurityThis E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
-
Updating Your Corporate BYOD Program for Success
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
-
Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
Sponsored by: TechTarget SecurityBYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
-
October Essentials Guide on Mobile Device Security
Sponsored by: TechTarget SecurityThe October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
-
Global Security University: IAM Integration Classroom
Sponsored by: IBMThis Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
Identity and Access Management Buyer's Guide
Sponsored by: IBMThis buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
-
Dell Mobile Clinical Computing - AlwaysOn Point of Care
Sponsored by: Dell and VMwareThis resource discusses why modernization of the point-of-care desktop has become an urgent health IT priority. Inside, learn how the right virtualization architecture can give caregivers the information access and protection that they need.
-
Identity and Access Management Security Live Chat Transcript
Sponsored by: SailPoint TechnologiesIn this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
-
Oracle Mobile and Social Service: The Next Step in IAM
Sponsored by: Oracle Corporation UK LtdAs cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
-
Information Security Magazine - April 2013
Sponsored by: TechTarget SecurityThis month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
-
Application Delivery and Optimization Solutions Spotlight- Checklist #1
Sponsored by: TechTarget NetworkingIn the first of SearchEnterpriseWAN.com's three-part guide on selecting application delivery optimization (ADO) solutions, get help assessing the business and technology issues surrounding these products and uncover the benefits they can bring your organization.
-
Solution Spotlight: Keys to Cloud Application Success
Sponsored by: IBMWhat do enterprise developers need to know about cloud APIs? What are the emerging standards for this game-changing technology? And how can they be leveraged most effectively? Read this expert e-guide to uncover the answers to these questions and other cloud API FAQs.
-
Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
Sponsored by: Tripwire, Inc.View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.