Access Control White Papers

Access Control includes authentication, authorization and audit. It also includes additional measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems. Authorization may be implemented using role based access control, access control lists or a policy language such as XACML.
Results 1 - 25 of 396Sort Results By: Published Date | Title | Company Name
By: Acquia     Published Date: Apr 16, 2015

Can you build an invincible Drupal site? The easy answer is no, but you have a few ways to prepare and secure your site to withstand any sort of vulnerability or traffic spike.

Tags : cloud security, security management, drupal site, protection, security, build an invincible drupal site, security, build secure drupal site
    
By: Citrix Systems     Published Date: Apr 15, 2015

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, migration, network architecture
    
By: Citrix Systems     Published Date: Apr 15, 2015

IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
By: IBM     Published Date: Apr 09, 2015

Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, optimization, security, cyber crime, network security, it security, access control, anti spyware
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper will help you choose the right cloud provider, optimise your security and deploy the solution.

Tags : virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper reveals how important is effective security software for banking threats.

Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks, access control, anti spyware, application security
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Bit9     Published Date: Apr 16, 2015

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Tags : advanced threat hunting, traditional detection, endpoint data collection, threat intelligence, threat detection, access control, firewalls, hacker detection
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging
    
By: Okta     Published Date: Feb 24, 2015

With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.

Tags : identity and access management, saas applications, single sign-on, active directory, management solutions, access control, identity management
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, access control, application security
    
By: CA Technologies     Published Date: Jan 09, 2015

This whitepaper details the 5 essential pillars of API management and which components are required for effective, enterprise-level API Management.

Tags : api management, business security, components of api management, api solutions, enterprise level api management, access control, application security, application performance management
    
By: CA Technologies     Published Date: Jan 09, 2015

This White Paper provides information on how enhance delivery secure and improve customer experience.

Tags : security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions, access control, anti spam, application security
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.

Tags : apis, risks of apis, apis can increase organization's risks, api security, access control, anti spam, application security, disaster recovery
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.

Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security, access control, application security, business continuity, identity management
    
By: CA Technologies     Published Date: Jan 09, 2015

This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.

Tags : identity-based security, business protection, identity, security solutions, new trends to secure business, access control, application security, authentication
    
By: CA Technologies     Published Date: Jan 09, 2015

This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.

Tags : byod, identity, byoid benefits, access control, application security, authentication, identity management, intrusion prevention
    
By: CA Technologies     Published Date: Jan 09, 2015

This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.

Tags : authentication, security, risk-based authentication, network security, access control, password management, security management, web service security
    
By: Firehost     Published Date: Jan 07, 2015

This Webinar covers all of the details you will need to know about PCI DSS 3.0.

Tags : pci dss 3.0, data security program, risk management practices, pci, backup and recovery, access control, anti virus, application security
    
By: CA Technologies     Published Date: Nov 07, 2014

Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.

Tags : mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, access control, application security
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: CA Technologies     Published Date: Oct 22, 2014

This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.