Network Access Control Software Reports

CW APAC October 2023 – Buyer’s guide to IAM
sponsored by TechTarget ComputerWeekly.com
EZINE: Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
Posted: 19 Oct 2023 | Published: 19 Oct 2023

TechTarget ComputerWeekly.com

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

How to Thwart Privilege Creep with Access Reviews
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

TechTarget Security

Case Study: A Major European Development Bank Turns to HyTrust to Virtualize its IT Infrastructure and Enable Secure, Efficient Delivery of Services
sponsored by HyTrust
CASE STUDY: With a data center structured on aging legacy systems, IT administrators at the Development Bank soon realized that server virtualization, was the key to supporting the bank's long-term goals. Access this exclusive resource for a case study of the Development Bank's implementation of the HyTrust Appliance alongside their virtualization deployment.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

HyTrust

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Computer Weekly – 5 April 2016: Seven steps to digital leadership
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.
Posted: 04 Apr 2016 | Published: 05 Apr 2016

TechTarget ComputerWeekly.com

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM

Oracle Identity Analytics- A Business Perspective
sponsored by Oracle Corporation
WHITE PAPER: This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
Posted: 13 Jun 2011 | Published: 01 Feb 2010

Oracle Corporation