Wireless Access Control Reports

Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER: Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TOPICS:  Access Control
ERROR TEST

5 Critical Security Callouts to Know in 2024
sponsored by Cisco DUO
INFOGRAPHIC: Cisco conducted a survey and compiled the results in their 2024 Duo Trusted Access Report, which evaluates the new frontier for access management and identity security. Gain an understanding of the top 5 most important takeaways from the report in this infographic.
Posted: 09 May 2024 | Published: 09 May 2024

Cisco DUO

Mitigating Insider Threats
sponsored by IBM
WEBCAST: This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
Posted: 14 Aug 2013 | Premiered: Aug 14, 2013

IBM

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

Computer Weekly: Robots at Your Service
sponsored by TechTarget ComputerWeekly.com
EZINE: Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
Posted: 11 Mar 2016 | Published: 15 Mar 2016

TechTarget ComputerWeekly.com

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata