> Home

access control

Results 251 - 275 of 347Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Dec 15, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch® support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, VMware AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
    
VMware
Published By: Citrix     Published Date: Nov 04, 2013
Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access. Click here to find out why.
Tags : 
citrix xenapp, xenapp, application delivery, application integration, device management, device access, remote access, remote network management, mobile data systems, mobile workers, smart phones, wireless application software, wireless phones, application performance management, windows
    
Citrix
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, wireless, knowledge management, enterprise applications, access control, phishing, software compliance, business intelligence
    
Bitium
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware AirWatch
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web, hacker detection, web service security, web services, data protection, secure content management
    
Citrix Systems, Inc.
Published By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp, it career advancement
    
NetCom Info
Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Published By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection, monitoring, wlan management, security policies, airdefense
    
AirDefense
Published By: A10 Networks     Published Date: Apr 14, 2006
Download this white paper to learn how IAM projects can be practical, affordable and provide quick ROI for companies of all sizes.
Tags : 
access control, identity management, access management, authentication, roi, return on investment, a10, a10 networks, security, network management, network security, remote access, application security, password management, security management, single sign on
    
A10 Networks
Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks
Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail, remote access
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi, ssl, vpn, secure access, aventail, networking, wireless, remote network management, access control, wireless application software, wireless communications, wireless infrastructure, wlan
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail, ssl vpn, network security, authentication
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies, malware, intrusion prevention, ssl, secure socket layer, vpn, virtual private network, vpns, virtual private networks, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access, remote access security, employee productivity, productivity, cost control, aventail
    
Aventail
Published By: IDFocus     Published Date: Aug 21, 2009
In the Identity Management space, there are 3 leading applications: Web access control, single sign-on, and password management. The document also describes two alternative approaches to combining these solutions.
Tags : 
password management, identity management, access management, iam, identity and access management, single sign on, single sign-on, access control, idfocus
    
IDFocus
Published By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : 
network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based, policy-based, mirage, mirage networks, internet security, security management
    
Mirage Networks
Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok, identity management
    
Okiok
Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management, pointsec, security management
    
Pointsec
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management, web service security, secure computing, securecomputing, network security
    
Secure Computing
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : 
access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
    
Sigaba
Published By: Sigaba     Published Date: Aug 21, 2009
This paper presents the business case for secure messaging, which extends far beyond compliance issues. In fact, choices about when to implement secure messaging affect every aspect of banking.
Tags : 
financial, bank, access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, compliance
    
Sigaba
Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this white paper from St. Bernard Software to read about a variety of contemporary, Internet-borne threats that are making it foolhardy for any business to provide unfettered Internet access for its users.
Tags : 
filtering, email security, firewall, access control, employee internet access, internet security, web security, restrictions, st bernard, st. bernard, network management, traffic management, security policies
    
St Bernard Software
Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv, customer service, customer satisfaction, texas instruments, remote network management, service management
    
Texas Instruments
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Home