Access Control Lists Reports

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Oct 2019

TechTarget ComputerWeekly.com

The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023

TechTarget ComputerWeekly.com

Definitive Guide to Next Generation Network Access Control
sponsored by Forescout Technologies, Inc.
WHITE PAPER: This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Forescout Technologies, Inc.

Who needs security orchestration, automation and response?
sponsored by TechTarget Security
EBOOK: Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

TechTarget Security

IAM Evaluation And Deployment Guidelines
sponsored by OpenIAM
EGUIDE: Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: This guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Celestix Networks

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM