ACLs Reports

The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2021

TechTarget ComputerWeekly.com

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

IAM Evaluation And Deployment Guidelines
sponsored by OpenIAM
EGUIDE: Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

Avoiding Insider Threats to Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Posted: 04 Nov 2013 | Published: 31 Oct 2012

IBM

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

TechTarget ComputerWeekly.com

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR