Web Access Control White Papers

(View All Report Types)
Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Better Leveraging Active Directory
sponsored by Radiant Logic, Inc.
WHITE PAPER: Find out how your business can have a better and more efficient identity management system in this white paper.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Radiant Logic, Inc.

Beverly Hills Wealth Management Case Study
sponsored by Intel
WHITE PAPER: Read this case study and learn how and why Beverly Hills Wealth Management, a Registered Investment Advisor Firm, selected Intel's Identity and Access Management Solution that combines single sign-on, user account provisioning/deprovisioning, and access management for its users.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Intel

Secure Mobile Devices with a Next Generation Firewall
sponsored by Dell Software
WHITE PAPER: This white paper provides one suggestion for securing your mobile devices with a next generation firewall.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Five Best Practices to Protect Your Virtual Environment
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment.
Posted: 01 May 2012 | Published: 20 Apr 2012

Juniper Networks, Inc.

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011

GeoTrust, Inc.

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro