Privileges Reports

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

How to Thwart Privilege Creep with Access Reviews
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

TechTarget Security

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

E-Book: Best Practices - How to implement and maintain enterprise user roles
sponsored by CA Technologies
EBOOK: Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.
Posted: 29 Jun 2010 | Published: 29 Jun 2010

CA Technologies

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd

Closing the Loop for Effective Network Operations Management Webcast
sponsored by Cisco Systems, Inc.
WEBCAST: This webcast explores the need for operational efficiency in the modern enterprise and why network monitoring and management is so vital. View now to uncover details of a portfolio of networking products that can help you with network visibility, troubleshooting, and more!
Posted: 29 Jun 2012 | Premiered: May 15, 2012

Cisco Systems, Inc.

Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER: Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007

BeyondTrust Corporation

The Threat Within: The Case for Zero Trust Access Control
sponsored by Xceedium
WHITE PAPER: It's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.
Posted: 22 May 2012 | Published: 22 May 2012

Xceedium

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM