Access Control White Papers

Access Control includes authentication, authorization and audit. It also includes additional measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems. Authorization may be implemented using role based access control, access control lists or a policy language such as XACML.
Results 1 - 25 of 444Sort Results By: Published Date | Title | Company Name
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: Nuance Communications     Published Date: Mar 16, 2010

The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control
    
By: Diligent     Published Date: Aug 05, 2016

This article provides an evaluation framework for directors and senior management. Focus is on three main factors: where data is stored, the strength of “locks” that provide access, and the control of “keys” for entry.

Tags : cybersecurity, security management, security, access control, anti spam, application security, security policies
    
By: Cisco     Published Date: Jun 16, 2016

Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.

Tags : security, application security, access control, security policies, anti spyware, email security, internet security
    
By: Cisco     Published Date: Jun 16, 2016

As much as the Digital Economy and the Internet of Everything (IoE) create opportunities for companies and consumers - over $19 trillion in value to organizations over the next decade - they also create opportunities for hackers and cybercriminals. With an expanded attack surface represented by the IoE, cybercriminals look to cash in on the estimated value of $450 billion to over $1 trillion of the Hacker Economy.

Tags : security, technology, digital, cyber attack, data, access control, anti spyware, application security
    
By: Avaya     Published Date: Jun 15, 2016

Solving critical healthcare IT challenges with software-defined networkingDigitization is changing healthcare forever as organizations look to deliver better quality services, improve patient safety and provide the highest levels of security. Healthcare IT leaders should look to leverage a software-defined network. Read the latest from ZK Research to learn more.

Tags : healthcare, information technology, networking, security, access control, authentication, network security appliance, productivity
    
By: Absolute Software     Published Date: May 31, 2016

The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.

Tags : healthcare, security capabilities, data security, best practices, security, access control, anti spyware, application security
    
By: Centrify     Published Date: May 26, 2016

This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.

Tags : data security, security, cyber attacks, threat and vulnerability management, access control, application security, hacker detection, security management
    
By: Centrify     Published Date: May 26, 2016

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.

Tags : security, endpoint security, access control, authentication, security management
    
By: Forcepoint     Published Date: May 16, 2016

Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control
    
By: Forcepoint     Published Date: May 16, 2016

The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control
    
By: Kaspersky     Published Date: May 11, 2016

You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Tags : kaspersky, ransomware, encyyption, data access, email security, company security, network security, access control
    
By: Forcepoint     Published Date: Apr 20, 2016

The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.

Tags : cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security, access control
    
By: Forcepoint     Published Date: Apr 20, 2016

This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.

Tags : security, security protection, security architecture, security, protection, access control, anti spam, anti spyware
    
By: Cisco     Published Date: Mar 16, 2016

This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.

Tags : service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks, access control
    
By: Cisco     Published Date: Mar 16, 2016

This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.

Tags : cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
    
By: Logrhythm     Published Date: Feb 24, 2016

The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.

Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.

Tags : citrix, frost & sullivan, next-gen, enterprise, infrastructure, ip networks, network security, access control
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.

Tags : citrix, enterprise, application, enterprise, network security, access control, mobile computing, mobile workers
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

This paper highlights nine key datacenter and cloud architecture challenges that NetScaler helps solve more effectively than F5 to help you.

Tags : citrix, netscaler, data center, cloud, remote access, access control, application security, data protection
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.

Tags : citrix, security, remote access, network performance, network security, remote network management, access control, security management
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.

Tags : citrix, security, remote access, delivery, infrastructure, access control, email security, firewalls
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.

Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.

Tags : security, security application, pki, authentication, internet security, security access, access control, application security
    
By: Entrust Datacard     Published Date: Nov 24, 2015

This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.

Tags : entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services, access control, application security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.