Network Access Control Software Reports

5 Critical Security Callouts to Know in 2024
sponsored by Cisco
INFOGRAPHIC: Cisco conducted a survey and compiled the results in their 2024 Duo Trusted Access Report, which evaluates the new frontier for access management and identity security. Gain an understanding of the top 5 most important takeaways from the report in this infographic.
Posted: 09 May 2024 | Published: 09 May 2024

Cisco

CW APAC October 2023 – Buyer’s guide to IAM
sponsored by TechTarget ComputerWeekly.com
EZINE: Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
Posted: 19 Oct 2023 | Published: 19 Oct 2023

TechTarget ComputerWeekly.com

A Computer Weekly e-Guide to IAM
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 08 Feb 2021 | Published: 10 Dec 2020

TechTarget ComputerWeekly.com

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER: SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

HP Virtual Desktop Infrastructure with Citrix XenDesktop
sponsored by Citrix and HP
WHITE PAPER: The HP and Citrix solution offers you the functionality of a stand-alone desktop, while enabling unified management of both physical and virtual infrastructures from the same centralized console.
Posted: 07 Jan 2009 | Published: 07 Jan 2009

Citrix and HP

Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE: Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008

Information Security Magazine

Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER: Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007

BeyondTrust Corporation

Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER: Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Varonis

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata