Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

control access

Results 1 - 25 of 243Sort Results By: Published Date | Title | Company Name
Published By: Godfrey     Published Date: Oct 02, 2008
A key difference between consumer and business-to-business branding is the influence of selling channels, including sales reps, dealers and distributors. While many consumer products are also sold through a channel, the marketer generally reaches past the channel with branding messages, relegating the channel to the status of a local point of sale. By contrast, in many B-to-B markets, the local dealer or distributor really “owns” the end customer and can control access and communications to and from the customer.
Tags : 
godfrey, b-to-b, business-to-business, branding, b-to-b branding, b-to-b brand, distribution, b-to-b distribution, channels, distribution channels, b-to-b distribution channels, branding and distribution, distributors, dealers, brand, b-to-b marketer, b-to-b buying
    
Godfrey
Published By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : 
radius, servers, idengines, id engines, identity engines, vpn
    
Identity Engines
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn about the 10 requirements needed for optimizing your network for mobility and see the potential issues IT faces in a mobile-first enterprise and the advantages of framing the problems properly for long-term success and effectiveness.
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access, it management
    
Aerohive Networks
Published By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection, monitoring, wlan management, security policies, airdefense
    
AirDefense
Published By: Cisco     Published Date: May 24, 2019
Mobile Global Workforce is predicted to surge to 1.87 billion by 2022. Be prepared for the wireless expansion with Mobility Express. Cisco’s Mobility Express* is designed for small businesses that want a controllerless solution with Wi-Fi management functions embedded in the Cisco Aironet® access point itself. Offering SMB’s Cisco’s industry-leading enterprise capabilities at a fraction of the enterprise cost.
Tags : 
    
Cisco
Published By: CA Technologies     Published Date: Mar 06, 2015
OAuth offre all'utente il pieno controllo sulla delega dell'accesso a un'API. Questo consente l'integrazione tra servizi per conto di tale utente. Gli stessi fornitori web social che hanno reso popolare il modello costituito dall'esposizione di un'API per consentire agli sviluppatori di terze parti di arricchire le loro piattaforme, sono stati i primi ad applicare questi meccanismi di autorizzazione delegati. OAuth č stata definito nel 2006, per standardizzare i meccanismi di questo tipo.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
    
CA Technologies
Published By: Winshuttle     Published Date: Apr 18, 2017
How can a finance and/or controller professional access SAP FICO data leveraging Microsoft Excel in a highly usable and interoperable fashion while respecting all of the SAP core security and governance controls? In order to fully explore this question, this white paper highlights five valuable ways to leverage Microsoft Excel to reduce Finance & Controller operational costs while making your SAP FICO systems implementation, management and maintenance life easier.
Tags : 
    
Winshuttle
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: SAS     Published Date: Mar 06, 2018
Known for its industry-leading analytics, data management and business intelligence solutions, SAS is focused on helping organizations use data and analytics to make better decisions, faster. The combination of self-service BI and analytics positions you for improved productivity and smarter business decisions. So you can become more competitive as you use all your data to take better actions. Instead of depending on hunch-based choices, you can make decisions that are truly rooted in discovery and analytics. And you can do it through an interface that anyone can use. At last, your business users can get close enough to the data to manipulate it and draw their own reliable, fact-based conclusions. And they can do it in seconds or minutes, not hours or days. Equally important, IT remains in control of data access and security by providing trusted data sets and defined processes that promote the valuable, user-generated content for reuse and consistency. But, they are no longer forced
Tags : 
    
SAS
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: IronStratus     Published Date: Apr 10, 2012
With all their benefits, cloud applications increase passwords and decrease IT control over user access, compromising security. Register for a free IronStratus account and start securely managing access to all your cloud applications in minutes.
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption, soo, login, identity management, identity and access management, access, access management
    
IronStratus
Published By: SAP     Published Date: Feb 11, 2011
Read this Aberdeen Group research report, "Access Management: Efficiency, Confidence and Control" and learn how top performers protect access to information assets at lower cost while staying on top of compliance.
Tags : 
sap, access management, efficiency, confidence, control, auditors
    
SAP
Published By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : 
avocent, data center services, infrastructure, ema, data center operations control, controlled data center infrastructure, monitoring, data center design and management, data center
    
Avocent
Published By: HP     Published Date: Jul 22, 2010
As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks.
Tags : 
network security, dns, botnet command and control (cnc), malware; phishing, hp tippingpoint, tippingpoint digital vaccine, tippingpoint n-platform ips, tippingpoint security management, ips platform, access switches, reputation database, security management system, network architecture, network management
    
HP
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies, malware, intrusion prevention, ssl, secure socket layer, vpn, virtual private network, vpns, virtual private networks, aventail
    
Aventail
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Aerohive     Published Date: Feb 06, 2008
Craig Mathias, Principal of the Farpoint Group, explores the advent of cooperative control, an innovative new class of wireless infrastructure from Aerohive Networks. Aerohive’s cooperative control architecture gives you all of the benefits of autonomous access points and controller-based infrastructures, without the high OPEX or CAPEX associated with either approach. Cooperative control architecture represents an innovative approach to wireless LAN systems, one that incorporates a number of interesting features and corresponding benefits.
Tags : 
wireless lan, wlan, wireless architecture, wireless infrastructure, aerohive, wifi, wi-fi, wireless, infrastructure, network architecture
    
Aerohive
Published By: VMware AirWatch     Published Date: Sep 11, 2015
One of the most common questions being asked by many customers recently is “How does AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization, network management
    
VMware AirWatch
Published By: ElcomSoft     Published Date: Dec 06, 2007
In order to protect important data, we use a large variety of methods and technologies, especially when the data in question is confidential and essential for day-to-day operations of a business and for making important management decisions. "If you have the information, you own the world" has become the basic tenet of our times, where control over data is of the utmost significance. The loss of access to important data can have a very negative impact on the company’s business.
Tags : 
password, password management, access control, server access, network management, windows, windows management, user access, data protection, elcomsoft
    
ElcomSoft
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.