Access Control White Papers

Access Control includes authentication, authorization and audit. It also includes additional measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems. Authorization may be implemented using role based access control, access control lists or a policy language such as XACML.
Results 1 - 25 of 361Sort Results By: Published Date | Title | Company Name
By: Global Knowledge     Published Date: Feb 14, 2014

Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing, and overall cost savings. Learn what you need to know and where to start before launching an AWS-hosted service.

Tags : global knowledge, speed aws, aws deployment, amazon web service, developer productivity, cloudformation, aws resources, collaboration engines
    
By: Kaspersky     Published Date: Feb 14, 2014

Selecting the right virtual-aware anti-malware solution is more important now than ever. Read this white paper to learn the risks associated with virtualization, and the options available for your security needs.

Tags : virtualization, kaspersky, virtual security, cloud security, business security, storage virtualization, access control, business continuity
    
By: Kaspersky     Published Date: Feb 14, 2014

This paper examines the role that Kaspersky Endpoint Security for Business has in meeting IT needs related to ease of use, effectiveness and return-on-investment in the strategically important market for endpoint security

Tags : endpoint security, security, it security, access control, idc, kaspersky, identity management, password management
    
By: Kaspersky     Published Date: Feb 14, 2014

If businesses are to benefit from the potential productivity gains offered by increased mobile access – and employees are able to enjoy the convenience of BYOD – security and IT departments are faced with having to ensure their business is protected against all the new mobile security threats.

Tags : mobile security, secure networks, mobile, smartphone, iphone, mobile data, access control, security management
    
By: Liaison Technologies     Published Date: Feb 07, 2014

Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.

Tags : liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.

Tags : idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.

Tags : security, cloud, application delivery, authentication, access control, application security, silos, password fatigue
    
By: IBM     Published Date: Feb 27, 2014

This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.

Tags : ibm, ibm software, innovation, software development, smart products, product delivery, smart software, consumerization
    
By: Kaseya     Published Date: Feb 11, 2014

Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.

Tags : kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
    
By: Bitium     Published Date: Jan 22, 2014

Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.

Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Unfortunately most large organizations aren't ready for this brave new world of digital content distribution remaining woefully unsearchable while languishing behind departmental silos. This whitepaper explores how your organization can leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 06, 2014

As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.

Tags : mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.