Access Control White Papers

Access Control includes authentication, authorization and audit. It also includes additional measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems. Authorization may be implemented using role based access control, access control lists or a policy language such as XACML.
Results 1 - 25 of 377Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014

Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.

Tags : email, mobile, collaboration, smartphone, tablets, productivity, access control, mobile workers
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Allscripts     Published Date: May 01, 2014

Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.

Tags : allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional
    
By: Box     Published Date: Mar 13, 2014

This recorded webinar discusses the latest challenges with BYOD (Bring Your Own Device) faced by today's organizations and recommendations on how to move forward with a BYOD workforce.

Tags : box, byod, mobile devices, iphone, android, mobile workers, mobile workforce, remote management
    
By: IBM     Published Date: Feb 27, 2014

This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.

Tags : ibm, ibm software, innovation, software development, smart products, product delivery, smart software, consumerization
    
By: Global Knowledge     Published Date: Feb 14, 2014

Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing, and overall cost savings. Learn what you need to know and where to start before launching an AWS-hosted service.

Tags : global knowledge, speed aws, aws deployment, amazon web service, developer productivity, cloudformation, aws resources, collaboration engines
    
By: Kaspersky     Published Date: Feb 14, 2014

If businesses are to benefit from the potential productivity gains offered by increased mobile access – and employees are able to enjoy the convenience of BYOD – security and IT departments are faced with having to ensure their business is protected against all the new mobile security threats.

Tags : mobile security, secure networks, mobile, smartphone, iphone, mobile data, access control, security management
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Imprivata     Published Date: Dec 06, 2013

This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
By: Cisco     Published Date: Jun 16, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : access control, anti spam, anti spyware, anti virus, email security, internet security, web service security
    
By: Cisco     Published Date: Jun 12, 2014

U.K. energy contractor reduces total cost of ownership while improving customer service and adopting new ways of working.

Tags : cisco, unified communications solutions, borderless network infrastructure, cisco ironport security, case study, access control, anti spam, anti spyware
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

A white paper on the demands you should make from your next-generation firewall.

Tags : ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

A white paper on the demands you should make from your next-generation firewall.

Tags : ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware
    
By: Mimecast     Published Date: May 15, 2014

This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, access control
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Absolute Software     Published Date: May 14, 2014

Three simple steps to legally secure and manage employee-owned devices within a corporate environment

Tags : byod, workforce mobility, enpoint protection, mobile devices, absolute software, access control, application security, identity management
    
By: Absolute Software     Published Date: May 14, 2014

Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.

Tags : endpoint protection stategy, byod, workforce mobility, absolute software, own device, access control, application security, email security
    
By: Citrix     Published Date: May 08, 2014

A report into the need for datacenter security and how Citrix NetScaler is the solution.

Tags : datacenter security, netscaler, citrix, defense, access control, application security, ddos, internet security
    
By: Citrix     Published Date: May 08, 2014

A report into the marked insurgence of denial of service (DoS) attacks and the benefits of Citrix NetScaler in the defense of these attacks.

Tags : denial of service, dos, adc, defence, security, citrix, netscaler, access control
    
By: McAfee, Inc.     Published Date: May 07, 2014

An introduction and overview of McAfee Real Time Command.

Tags : real time command, mcafee, enterprise assets, control, access control, anti spam, anti spyware, anti virus
    
By: Kaseya     Published Date: Feb 11, 2014

Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.

Tags : kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
    
By: Liaison Technologies     Published Date: Feb 07, 2014

Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.

Tags : liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai
    
By: Bitium     Published Date: Jan 22, 2014

Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.

Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Unfortunately most large organizations aren't ready for this brave new world of digital content distribution remaining woefully unsearchable while languishing behind departmental silos. This whitepaper explores how your organization can leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.