Privileges Reports

Handbook: Identity and Access Management
sponsored by TechTarget Security
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security

Provisioning Should Be Simple Why Traditional Provisioning Systems Are No Longer Relevant
sponsored by Aveksa
PRESENTATION TRANSCRIPT: Do you want to improve your provisioning system? In the past provisioning has been expensive and ineffective, but that can all improve with a few changes. Deciding who has access to your business enterprise is one of the first steps to take towards improvement.
Posted: 24 Jul 2012 | Published: 23 Jul 2012

Aveksa

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

E-Book: Best Practices - How to implement and maintain enterprise user roles
sponsored by CA Technologies
EBOOK: Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.
Posted: 29 Jun 2010 | Published: 29 Jun 2010

CA Technologies

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd

Managing Identities and Access Control
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
Posted: 24 Feb 2010 | Published: 24 Feb 2010

TechTarget Security

Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT: Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012

WatchDox

E-Guide: Achieving compliance through IAM
sponsored by TechTarget Security
EGUIDE: Read this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

TechTarget Security

Application Delivery and Optimization Solutions Spotlight- Checklist #1
sponsored by TechTarget Networking
EBOOK: In the first of SearchEnterpriseWAN.com's three-part guide on selecting application delivery optimization (ADO) solutions, get help assessing the business and technology issues surrounding these products and uncover the benefits they can bring your organization.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

TechTarget Networking