Privileges Reports

Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by TechTarget Security
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

TechTarget Security

The Intelligent Campus LAN
sponsored by Juniper Networks, Inc.
EGUIDE: Access this Tech Guide from SearchNetworking.com to learn how you can update your campus LAN to address the modern needs of your network, including application delivery and mobility.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

Juniper Networks, Inc.

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

Avoiding Insider Threats to Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Posted: 04 Nov 2013 | Published: 31 Oct 2012

IBM

The Threat Within: The Case for Zero Trust Access Control
sponsored by Xceedium
WHITE PAPER: It's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.
Posted: 22 May 2012 | Published: 22 May 2012

Xceedium

Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER: Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Viewfinity

Application Delivery and Optimization Solutions Spotlight- Checklist #1
sponsored by TechTarget Networking
EBOOK: In the first of SearchEnterpriseWAN.com's three-part guide on selecting application delivery optimization (ADO) solutions, get help assessing the business and technology issues surrounding these products and uncover the benefits they can bring your organization.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

TechTarget Networking