Privileges Reports

Wave Methodology- A Practical Guide to Defining Roles for Access Control
sponsored by Oracle Corporation
WHITE PAPER: As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
Posted: 13 Jun 2011 | Published: 10 Jun 2011

Oracle Corporation

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by TechTarget Security
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

TechTarget Security

Wireless LANs and Multimedia: Matching wired network performance and quality
sponsored by TechTarget Security
EZINE: The June edition of SearchNetworking.com’s Network Evolution E-Zine outlines the three basic steps enterprises should follow when preparing for video. Uncover how to integrate these steps into your network plans and learn how to say goodbye to your troubles with video.
Posted: 01 Jun 2012 | Published: 30 May 2012

TechTarget Security

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
sponsored by Intel
WHITE PAPER: Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
Posted: 10 May 2011 | Published: 10 May 2011

Intel

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

TechTarget ComputerWeekly.com

Managing Identities and Access Control
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
Posted: 24 Feb 2010 | Published: 24 Feb 2010

TechTarget Security

The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

ALTR

Avoiding Insider Threats to Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Posted: 04 Nov 2013 | Published: 31 Oct 2012

IBM

Mobilize to Rightsize Your Network
sponsored by Aruba Networks
WHITE PAPER: Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!
Posted: 30 May 2012 | Published: 14 Mar 2011

Aruba Networks

Handbook: Identity and Access Management
sponsored by TechTarget Security
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security