Network Access Control Reports

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix