Access Control Lists Reports

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID Global
WHITE PAPER: In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

HID Global

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

IAM Evaluation And Deployment Guidelines
sponsored by OpenIAM
EGUIDE: Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.