Category Archives: Access Control

Cisco Physical Security Solutions: Improve School Safety

Physical security is a top priority for school districts. Safe and secure campuses are better learning environments. They help attract and retain teachers. Preventing theft and vandalism frees up money for 21st century learning programs. And schools need to issue timely warnings about threats to students, parents, and employees. To […]

Read More

IDC Spotlight: Access Control and Certification

Read this brief for best practices on managing user access compliance. Ensuring user access is compliant with policy and regulatory requirements is critical to managing IT security and demonstrating audit compliance. This brief by IDC discusses best practices and solutions for addressing these challenges. Courion Corporation Please fill the below […]

Read More

Achieving NAC Now and in the Future: The Role of SSL VPNs

Today, huge challenges exist to implementing as-yet immature NAC solutions: complex integration requirements, inadequate inspection capabilities, and weak policy management. NAC is a multifaceted framework to control who and what gets access to network resources, and helps keep malware from entering the enterprise. Today, there are huge challenges to implementing […]

Read More

802.1X Authentication Standard for Network Access Control

Implement enterprise-wide secure wireless LAN access. In record numbers organizations are embracing mobility and wireless access (WLAN). They demand hassle-free, anytime, anywhere access that enables employees to be connected and productive 24/7. While mobility and wireless network access are highly desirable, maintaining security remains a key concern for enterprises. The […]

Read More

Version Control with Subversion — Free 468 Page eBook

Subversion is a free/open source version control system (VCS). That is, Subversion manages files and directories, and the changes made to them, over time. One of the greatest frustrations in most software projects is version control: the art of managing changes to information. Today's increasingly fast pace of software development–as […]

Read More

Joomla! 1.7: Access Control Lists in Depth

In this course, author Jen Kramer uses access control lists (ACLs) to define and implement user permissions on a Joomla web site. The course covers granting access to front-end content, customizing a login page for different user groups, delivering specific content to certain user types, and creating a simplified back […]

Read More

Entitlement Management Meets the Network

Learn how large organization CIOs should prepare for the inevitable migration of Access Management from applications to the network. How do CIOs make sure that credentialed users can access the IT resources they need while hackers and criminals are locked out? In this white paper, Jon Oltsik, Senior Analyst at […]

Read More

NAC at the Endpoint: Control Your Network Through Device Compliance

Learn why NAC at the endpoint is the most effective way to manage who and what connects to your organization’s network. Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic passed through just one gateway. However, the […]

Read More

NAC 2.0: A New Model for a More Secure Future

Learn why NAC 2.0 is the future of Network Access Control. As organizations turn to Network Access Control (NAC) technologies to protect their networks and data, the flaws of earlier versions of NAC are becoming apparent. New pressures from a constantly changing threat environment and an increasingly mobile workforce require […]

Read More

Ensim Unify Enterprise Edition: User Provisioning and Access Control Software

Learn how to address the high cost and growing complexity of providing user provisioning and access control for the collaboration infrastructure. Ensim Unify Enterprise Edition is a user provisioning and access control software suite that provides a secure framework for user provisioning, account workflow, and identity storage through delegated self-service […]

Read More

NAC at the Endpoint: Control your Network Through Device Compliance

Learn why NAC at the endpoint is the most effective way to manage who and what connects to your organizations network. Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic passed through just one gateway. However, the […]

Read More

NAC: Managing Unauthorized Computers

Learn how your enterprise can combat today’s threats and still remain nimble enough for tomorrow’s potential threats. Unauthorized endpoint computers pose significant security risks to organizations. Where underlying network-based enforcement is available, network access control (NAC) solutions provide detection and implementation of security policies to minimize these risks. However, in […]

Read More

IPSec vs. SSL VPNs for Secure Remote Access

Learn how Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec Today, SSL VPNs are replacing IPSec because they are less costly to manage, eliminate security risks of open-by-default tunnels, and provide users with the easiest access to network resources—any time, anywhere. Learn whether an IPSec or SSL VPN will […]

Read More

Who Leads in WLAN Security?

Comparative evaluation of vendor offerings and positioning in the WLAN security market, including security issue discussion and vendor rankings. Today’s WLAN security market is filled with stopgap solutions while vendors wait for finalization of standards that include specifications for roaming, load balancing, management frame encryption, and management. Top considerations when […]

Read More

Secure and Control Data across All Mobile Endpoints

Learn how CREDANT’s Mobile Guardian Enterprise solution delivers advanced mobile data security with innovative ease-of-use features. CREDANT® Mobile Guardian® Enterprise Edition is a centrally managed policy-based mobile data security and management solution for laptops, desktops, tablet PCs, PDAs, smartphones, and removable media. CREDANT’s Mobile Guardian Enterprise solution can help you: […]

Read More

Secure Corporate Data with Policy-Based Intelligent Encryption

Hear about CREDANT’s next-generation encryption solution, offering better flexibility and ease-of-use than first-generation products. CREDANT Mobile Guardian 5.2, a new encryption method, enables a security administrator the flexibility to easily define rules that govern the application of encryption on devices, rules that can be as simple as defining entire drives […]

Read More

Stopping the Insider Threat with Network Access Control (NAC)

This paper discusses the Insider Threat that corporations face today, and how effective Network Access Control (NAC) provides corporations with increased security from insider threats and greater regulatory compliance. The threats against business-technology systems have never been higher. While software vulnerabilities, worms, viruses and spyware are a constant and costly […]

Read More

Joomla! 1.7: Access Control Lists in Depth

In this course, author Jen Kramer uses access control lists (ACLs) to define and implement user permissions on a Joomla web site. The course covers granting access to front-end content, customizing a login page for different user groups, delivering specific content to certain user types, and creating a simplified back […]

Read More