Searching all of TechTarget| 84,212 results for "access"

access: Access is simply being able to get to what you need.

See all definition search results provided by

Conversations: Lotus Domino transaction log access

See all conversation search results provided by ITKE.


By Stuart Burns Get Started Dec 01, 2016

VMware Access Point allows safe access to end-user computing resources

VMware Access Point relies on authentication, verification and isolation to create a secure gateway through which users can access end-user computing resources. Continue Reading

IoT Agenda

By Scott Allen Get Started Oct 12, 2016

From sensor to server: Communication at the access layer

With dedicated solutions for the IT access layer, IoT data can be analyzed, acted upon and transmitted from anywhere in an industrial IoT network. Continue Reading


By Jonathan Hassell Manage Dec 02, 2016

Access for Office 365 external users a concern for admins

Microsoft added external access for Office 365 Groups, which means administrators must contend with confidentiality and lifecycle issues until the service matures. Continue Reading


By Alex Scroxton Dec 02, 2016

Businesses forget disability and accessibility when buying IT

Both customer and supply side IT organisations need to consider the needs of disabled people when embarking on new procurements, according to a recent study Continue Reading


By Lis Evenstad Nov 23, 2016

NHS Wales extends GP records access

NHS Wales Informatics Service develops an audit tool, making it easier for hospital doctors and pharmacists to safely access patients’ details electronically Continue Reading


Sep 13, 2016

Access, not ownership: financing software in the channel

Ownership does not have to be the be all and end all according to Tristan Watkins, CEO, BNP Paribas Leasing Solutions UK Continue Reading


By Jack Madden Evaluate Nov 11, 2016

Why you need identity and access management as a service

Identity and access management is a critical part of managing today's mobile infrastructures. IT shops should consider IDaaS to help ease the burden on administrators. Continue Reading


By Stephen J. Bigelow Manage Oct 31, 2016

How do AWS IAM permissions manage resource access?

We use AWS Identity and Access Management for cloud security, but aren't sure how roles, permissions and policies differ in a cloud security strategy. How do they protect resources? Continue Reading


By Michael Cobb Manage Oct 27, 2016

Privileged user access: Managing and monitoring accounts

Maintaining the security principle of least privilege can prevent abuse of privileged user accounts. Learn about the best practices for monitoring privileged access. Continue Reading


By Michael Cobb Manage Oct 24, 2016

Preventing privilege creep: How to keep access and roles aligned

Privilege creep can result in the abuse of user access and security incidents. Expert Michael Cobb explains how enterprises can keep user roles and privileges aligned. Continue Reading