network access

Results 251 - 275 of 296Sort Results By: Published Date | Title | Company Name
Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok
    
Okiok
Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management
    
Pointsec
Published By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : 
intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered
    
TopLayer
Published By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : 
network management, network security, access control, nac, network access control, identity management, security management, authentication
    
Trusted Network Tech
Published By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : 
access control, nac, network, identity management, network access control, security, internet security, trusted network tech
    
Trusted Network Tech
Published By: Symantec     Published Date: Jun 12, 2008
Looking for a network security solution? Whether you've already adopted NAC for your enterprise or are researching options, download this helpful survey presented by IDC about NAC benefits and vendor overviews.
Tags : 
network access control, network security, security, nac, symantec
    
Symantec
Published By: Dell Software     Published Date: Jul 18, 2012
Implement PCI Compliance
Tags : 
pci, payment card industry, data security, scriptlogic, mocrosoft windows, it systems, data security, secure network
    
Dell Software
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations
    
Quocirca
Published By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : 
insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management
    
NetIQ Corporation
Published By: Neterion     Published Date: Dec 05, 2006
As the demand for bandwidth grows, so does the reach of networks. Users need to access data globally, from multiple locations around the world, quickly and transparently without breaking budgets. Data centers locked into servicing only local users unnecessarily constrain growth and expansion.
Tags : 
storage area network, gigabit, iscsi, datacenter, datacenters, sans, san, storage area networks
    
Neterion
Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management, information security, physical security, holistic
    
RiskWatch
Published By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : 
network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access
    
LANDesk
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : 
network security, access control, nac, network access control, intrusion prevention, landesk
    
LANDesk
Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management, remote access, remote network management, architecture
    
Jumpnode Systems
Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management, jumpnode
    
Jumpnode Systems
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This paper identifies the requirements for next-generation WLANs, examines the limitations of existing approaches, and describes an innovative WLAN architecture from Trapeze Networks called Smart Mobile™, which overcomes those limitations.
Tags : 
802.11n, wireless, wi-fi, wireless local area network, wlan, wireless network, mobile, voice over ip
    
Trapeze Networks
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
    
Decru
Published By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : 
gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats
    
GFI
Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
    
Nevis Networks
Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis
    
Nevis Networks
Published By: Solarflare Communications Inc.     Published Date: Mar 13, 2008
Solarflare’s creation of a ‘virtualization aware’ smart network adapter and modified Xen will allow direct, but safe, access to such adapters from guest operating systems in order to improve network performance.
Tags : 
data center, semiconductor, 10gbe, solarflare, phy solutions, virtualization
    
Solarflare Communications Inc.
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Purchase price alone is not an accurate measure as to the true costs of a system. When evaluating the products offered by different vendors, the purchaser should take into consideration: purchase cost of equipment and software; cost of installing the infrastructure including data cable and mains power outlet and power cables; cost of installation; cost of maintenance; and more.
Tags : 
energy, power, energy conservation, cost, cost of operation, tco, total cost of ownership, power management
    
Borer Data Systems Ltd.
Published By: ElcomSoft     Published Date: Dec 06, 2007
In order to protect important data, we use a large variety of methods and technologies, especially when the data in question is confidential and essential for day-to-day operations of a business and for making important management decisions. "If you have the information, you own the world" has become the basic tenet of our times, where control over data is of the utmost significance. The loss of access to important data can have a very negative impact on the company’s business.
Tags : 
password, password management, access control, server access, network management, windows, windows management, user access
    
ElcomSoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.