Network Access Control Software White Papers

(View All Report Types)
Securing Virtualised Environments and Accelerating Cloud Computing
sponsored by CA Technologies
WHITE PAPER: There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.
Posted: 01 Jun 2010 | Published: 01 May 2010

CA Technologies

Network Access Protection: New Ways to Keep Your Network Healthy
sponsored by Global Knowledge
WHITE PAPER: Learn how Network Access Protection (NAP) operates to isolate non-compliant or infected computers from the network until corrective measures can be taken.
Posted: 06 Jan 2007 | Published: 01 Jan 2007

Global Knowledge

Oracle Identity Analytics- A Business Perspective
sponsored by Oracle Corporation
WHITE PAPER: This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
Posted: 13 Jun 2011 | Published: 01 Feb 2010

Oracle Corporation

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Privileged user management: It's time to take control
sponsored by CA Technologies
WHITE PAPER: IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.
Posted: 01 Jun 2010 | Published: 01 Oct 2009

CA Technologies

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
sponsored by Dell Software
WHITE PAPER: This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER: Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007

BeyondTrust Corporation

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM