Access Control Reports

Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER: Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Varonis

Protecting SharePoint Data Long Term
sponsored by Varonis
WHITE PAPER: This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Varonis

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
sponsored by Shavlik Technologies
ANALYST NEWS: This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
Posted: 20 Jul 2009 | Published: 20 May 2009

Shavlik Technologies

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

Presentation Transcript: The Economics of Endpoint Security
sponsored by Sophos UK
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.
Posted: 25 Jun 2009 | Published: 24 Jun 2009

Sophos UK

SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by TechTarget Search Windows Server
EZINE: SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009

TechTarget Search Windows Server

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE: This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009

Information Security Magazine

Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT: Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009

BeyondTrust Corporation

eBook: Best Practices for DB2 on z/OS Performance
sponsored by BMC Software, Inc.
EBOOK: This book contains general information about improving performance for DB2 on z/OS and specific information about how BMC products help improve performance.
Posted: 17 Apr 2009 | Published: 17 Apr 2009

BMC Software, Inc.

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO: This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

Symantec Corporation

Understanding Web Application Security Challenges
sponsored by IBM
WHITE PAPER: This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Presentation Transcript: Accelerating Return-On-Investment with Roles Management
sponsored by Oracle Corporation
PRESENTATION TRANSCRIPT: This paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Oracle Corporation

Unsung Heroes - How Routing & Switching Keep the Business Going
sponsored by Cisco Systems, Inc.
WHITE PAPER: Routers and switches are the building blocks for all business communications from data to voice and video to wireless access.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Small Business Networking: The Basics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business networking begins with a secure, reliable, fast data network foundation. This paper fleshes out 7 ways small business networking can transform your company.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
sponsored by Bradford Networks
PRESENTATION TRANSCRIPT: Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

Bradford Networks

Total Economic Impact of Oracle Identity Manager
sponsored by Oracle Corporation
WHITE PAPER: Oracle Identity Manager is an enterprise identity management system that manages users' access right and privileges, throughout the provisioning life-cycle, within enterprise IT resources.
Posted: 19 Jan 2009 | Published: 03 Nov 2008

Oracle Corporation

Dell ProSupport Mobility Services
sponsored by DellEMC and IntelĀ®
DATA SHEET: Dell ProSupport Mobility Services can help ensure you have the access, security and support you need to help keep your business running virtually anywhere in the world.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

DellEMC and IntelĀ®

HP Virtual Desktop Infrastructure with Citrix XenDesktop
sponsored by Citrix and HP
WHITE PAPER: The HP and Citrix solution offers you the functionality of a stand-alone desktop, while enabling unified management of both physical and virtual infrastructures from the same centralized console.
Posted: 07 Jan 2009 | Published: 07 Jan 2009

Citrix and HP

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

Juniper Networks, Inc.

eBook: Strategies for Securing Virtual Machines
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

Information Security Magazine

How (and Why) to Get Going with Windows Vista Adoption
sponsored by Microsoft
TECHNICAL ARTICLE: There is a lot of misinformation about Windows Vista in a managed IT environment. This article is intended to clear up misperceptions and provide an honest and frank assessment of the challenges and benefits of Windows Vista for IT professionals.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

eBook: Software as a Service: What You Should Consider When Moving to SaaS
sponsored by TechTarget Security
EBOOK: Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

TechTarget Security