Network Access Control Software White Papers

(View All Report Types)
Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER: Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Varonis

HP Virtual Desktop Infrastructure with Citrix XenDesktop
sponsored by Citrix and HP
WHITE PAPER: The HP and Citrix solution offers you the functionality of a stand-alone desktop, while enabling unified management of both physical and virtual infrastructures from the same centralized console.
Posted: 07 Jan 2009 | Published: 07 Jan 2009

Citrix and HP

Wave Methodology- A Practical Guide to Defining Roles for Access Control
sponsored by Oracle Corporation
WHITE PAPER: As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
Posted: 13 Jun 2011 | Published: 10 Jun 2011

Oracle Corporation

Help Strengthen Security by Building a Trusted Identity Environment
sponsored by IBM
WHITE PAPER: As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
sponsored by Dell Software
WHITE PAPER: This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System
sponsored by Forescout Technologies, Inc.
WHITE PAPER: Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.
Posted: 23 Mar 2007 | Published: 01 Jan 2006

Forescout Technologies, Inc.

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Securing Access to the Office 365 Cloud with Two Factor Authentication
sponsored by Data3
WHITE PAPER: Secure access is a major concern when utilizing cloud-based Office 365, especially since today's users will be logging in from on and off-premises locations. This whitepaper details a 2 factor authentication process with convenient single sign on (SSO) for improved user experience and security.
Posted: 29 Oct 2013 | Published: 01 Feb 2012

Data3

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified