Searching all of TechTarget| 83,586 results for "access"

access: Access is simply being able to get to what you need.

See all definition search results provided by

Conversations: Lotus Domino transaction log access

See all conversation search results provided by ITKE.

IoT Agenda

By Scott Allen Get Started Oct 12, 2016

From sensor to server: Communication at the access layer

With dedicated solutions for the IT access layer, IoT data can be analyzed, acted upon and transmitted from anywhere in an industrial IoT network. Continue Reading


Sep 13, 2016

Access, not ownership: financing software in the channel

Ownership does not have to be the be all and end all according to Tristan Watkins, CEO, BNP Paribas Leasing Solutions UK Continue Reading


By Michael Cobb Manage Oct 24, 2016

Preventing privilege creep: How to keep access and roles aligned

Privilege creep can result in the abuse of user access and security incidents. Expert Michael Cobb explains how enterprises can keep user roles and privileges aligned. Continue Reading


By John Burke Evaluate Oct 18, 2016

WAN access options multiply when buying network services

A new menu of WAN access options means companies have a wide variety of means to reach cloud and network services. But more choice also means more potential pitfalls. Continue Reading


By Eddie Lockhart Manage Oct 04, 2016

Test your knowledge of mobile VDI access

Users require access to virtual resources on their mobile devices. IT can manage VDI on smartphones and tablets using authentication methods, individual virtual app delivery and more. Continue Reading


By Jason Sparapani News Sep 21, 2016

Bus stop app 'just the beginning' for accessibility tech

Perkins School for the Blind launches a mobile app to help commuters with vision loss find bus stops. And it's not stopping there. Continue Reading


By Rob Wright News Sep 19, 2016

Oracle acquires cloud access security broker Palerra

At its OpenWorld Conference in San Francisco, Oracle announced an agreement to acquire cloud access security broker startup Palerra to get into the CASB market. Continue Reading


By Paul Korzeniowski Evaluate Sep 07, 2016

Restrict access to system resources with VMware Identity Manager

As virtualization becomes more ubiquitous, users have greater access to system resources. However, this can lead to potential security issues. So what's an administrator to do? Continue Reading


By Dave Shackleford Sep 06, 2016

Buying cloud access security brokers with confidence

IT security professionals buying cloud access security broker services must focus on what the technology now offers and determine precisely what their company IT architecture requires. Here's how. Continue Reading


By Peter Loshin News Oct 24, 2016

Questions still loom after Dyn DNS DDoS disrupts internet access

Users and companies suffer after Dyn DNS DDoS attacks disrupt access to top sites; links to the Mirai botnet raise more questions, as Dyn mops up. Continue Reading