Privileges Reports

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by TechTarget Security
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by TechTarget Security
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by OpenText Security Solutions
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

OpenText Security Solutions

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

E-Book: Best Practices - How to implement and maintain enterprise user roles
sponsored by CA Technologies
EBOOK: Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.
Posted: 29 Jun 2010 | Published: 29 Jun 2010

CA Technologies

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by TechTarget Security
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER: Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Viewfinity

Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Best Practices for Managing and Understanding Mobile Authentication
sponsored by TechTarget Security
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

TechTarget Security