Searching all of TechTarget| 76,797 results for "access"

access: Access is simply being able to get to what you need.

See all definition search results provided by WhatIs.com

Conversations: Lotus Domino transaction log access

See all conversation search results provided by ITKE.

ComputerWeekly

Nov 25, 2015

Healthcare Data Access Compliance

Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions. Continue Reading

SearchVirtualDesktop

By Brien Posey Manage Dec 28, 2015

How to set up a virtual desktop access policy

For happy users and safe VDI, IT should set up an acceptable use policy that limits the number and type of devices users can connect to their virtual desktops with. Continue Reading

SearchCIO

By Sue Troy Evaluate Dec 28, 2015

Organic data growth and gaining access to the data

Find out how organic data growth has created a hybrid data architecture, the difficulties in providing access to data in those systems, and how a data lake fits into the equation. Continue Reading

SearchAWS

By Dan Sullivan Evaluate Oct 16, 2015

Manage AWS access to control security

AWS administrators can establish encryption keys and user and S3 policies to protect unwanted access to cloud resources. Continue Reading

SearchSecurity

By Michael Heller News Dec 08, 2015

Temporary workers cause access management troubles over the holidays

A new report showed that while retail companies are confident in their security, many use bad access-management practices with temporary workers brought in for the holiday season. Continue Reading

SearchCloudSecurity

By Rob Shapland Evaluate Dec 02, 2015

How the cloud access security broker space is evolving

The cloud access security broker space is accelerating at a fast clip, but expert Rob Shapland explains some obstacles for enterprises to consider before selecting a CASB platform. Continue Reading

SearchEnterpriseDesktop

By Ed Tittel News Nov 30, 2015

Windows Administrivia: The Case of the Missing BIOS Access

As is often the case on a holiday weekend, I like to tinker with my PCs. This Thanksgiving weekend, I found myself wanting to access the BIOS on my production PC with its Gigabyte X77X-UD3H ... Continue Reading

SearchAWS

By Alan R. Earls Manage Nov 16, 2015

AWS cloud access control falls on IT's shoulders

Restricting access to resources and closely governing permissions are solid practices in constructing a secure AWS cloud. While AWS provides tools, admins need to do the legwork. Continue Reading

SearchSecurity

By Ernie Hayden Problem Solve Nov 16, 2015

Manage vendor access for industrial control systems security

Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading

SearchAWS

By Kurt Marko Manage Aug 31, 2015

Group user access with Amazon IAM

While it is not a fit for every scenario, cloud administrators can save time by establishing access groups for users using AWS Identity and Access Management. Continue Reading