Web Access Control Reports

A Computer Weekly e-Guide to IAM
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 08 Feb 2021 | Published: 10 Dec 2020

TechTarget ComputerWeekly.com

Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro