ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Rights Research

  • Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

    Sponsored by: Intel

    Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.

  • Buyer’s Guide for Access Management

    Sponsored by: Oracle Corporation

    Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.

  • E-Book: Technical Guide on Managing Identities and Access Control

    Sponsored by: CA Technologies

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

  • Presentation Transcript: Effective and Secure User Account Provisioning

    Sponsored by: Hitachi ID Systems, Inc.

    Effective provisioning means not only working with an identity and access management provider and its product, but it is also about business process, effective communication and phased implementation.

  • E-Book: Best Practices - How to implement and maintain enterprise user roles

    Sponsored by: CA Technologies

    Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.

  • Managing Identities and Access Control

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

  • Role Based Access Control and Entitlement Management

    Sponsored by: FoxT

    The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.

  • Database Crime Scene Prevention

    Sponsored by: Imperva

    This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.

  • Entitlement Reviews: A Practitioner's Guide

    Sponsored by: Varonis

    This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data.

  • Fixing the "Everyone" Problem

    Sponsored by: Varonis

    Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.

  • Information Security Magazine, July 09: Controlling Privileged Accounts

    Sponsored by: Information Security Magazine

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  • eGuide: Essential Guide to Identity & Access Management

    Sponsored by: Information Security Magazine

    This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.

  • Building a Secure and Compliant Windows Desktop

    Sponsored by: BeyondTrust Corporation

    Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.

  • Network Access Protection: New Ways to Keep Your Network Healthy

    Sponsored by: Global Knowledge

    Learn how Network Access Protection (NAP) operates to isolate non-compliant or infected computers from the network until corrective measures can be taken.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.