Searching all of TechTarget| 81,764 results for "access"

access: Access is simply being able to get to what you need.

See all definition search results provided by WhatIs.com

Conversations: Lotus Domino transaction log access

See all conversation search results provided by ITKE.

SearchCloudSecurity

By Dan Sullivan Manage Mar 29, 2016

'Federated' identity and access management tools

Federated identity management has clear security advantages. Learn ways to use Microsoft's AD FS and AWS AD Connector as identity and access management tools in the cloud. Continue Reading

ComputerWeekly

By Bob Tarzey Mar 23, 2016

How to manage IT access for external users

Identity and access management has extended from being solely an internal IT management process to focus on external business engagement too Continue Reading

ComputerWeekly

May 05, 2016

A Computer Weekly buyer’s guide to access control

In this 11-page buyer’s guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers... Continue Reading

SearchEnterpriseDesktop

By Ed Tittel News May 05, 2016

No Blocking Store Access in Win10Pro

Now that Build 1511 has reached CBB status, admins can no longer use group policy for blocking Store access in Windows 10 Pro. Deal with it! Continue Reading

SearchContentManagement

By Reda Chouffani Manage Apr 25, 2016

Power BI tools make actionable data accessible to all

Microsoft Power BI provides data insights for executives, line-of-business workers and data analysts alike. Here's an overview of what it can do for each type of user. Continue Reading

SearchNetworking

By Tracee Herbaugh News Apr 14, 2016

Aerohive releases more flexible Wave 2 access points

Aerohive's latest Wave 2 access points are aimed at companies looking for higher speeds on existing Power over Ethernet infrastructure. Continue Reading

ComputerWeekly

Nov 25, 2015

Healthcare Data Access Compliance

Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions. Continue Reading

SearchCloudSecurity

By Dejan Lukan ,Dan Sullivan ,Dave Shackleford Evaluate Mar 25, 2016

Three perspectives on cloud identity and access management

Identity access management (IAM) systems work to help keep security high by initiating, capturing, recording and managing user identities and access permissions. Cloud identity and access management systems can ... Continue Reading

SearchEnterpriseDesktop

By Ed Tittel Evaluate Mar 21, 2016

Console, data access most important in endpoint management tools

Every IT shop has different needs when it comes to endpoint management tools. Although feature and console requirements may differ, all tools must provide users with the access they need. Continue Reading

SearchMobileComputing

By Steve Damadeo Manage Mar 18, 2016

How to balance access needs and mobile data security concerns

Mobile workers need to access corporate data, but giving them open access is often easier said than done. Businesses must balance users' wants with mobile data security concerns. Continue Reading