Privileges Reports

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

ALTR

Solution Spotlight: Keys to Cloud Application Success
sponsored by IBM
EGUIDE: What do enterprise developers need to know about cloud APIs? What are the emerging standards for this game-changing technology? And how can they be leveraged most effectively? Read this expert e-guide to uncover the answers to these questions and other cloud API FAQs.
Posted: 29 Nov 2012 | Published: 20 Nov 2012

IBM

The Threat Within: The Case for Zero Trust Access Control
sponsored by Xceedium
WHITE PAPER: It's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.
Posted: 22 May 2012 | Published: 22 May 2012

Xceedium

Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

IT in Europe - May 2012
sponsored by TechTarget Security
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012

TechTarget Security

IT Handbook : Smartphones & Tablets in the Enterprise
sponsored by TechTarget Security
EGUIDE: This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.
Posted: 10 Apr 2012 | Published: 10 Apr 2012

TechTarget Security

Avoiding Insider Threats to Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Posted: 04 Nov 2013 | Published: 31 Oct 2012

IBM

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
sponsored by Intel
WHITE PAPER: Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
Posted: 10 May 2011 | Published: 10 May 2011

Intel