Searching all of TechTarget| 71,336 results for "access"

access: Access is simply being able to get to what you need.

See all definition search results provided by Whatis.com

Conversations: Lotus Domino transaction log access

See all conversation search results provided by ITKE.

SearchNetworking

Problem Solve Apr 15, 2015

What's the best way to safely preconfigure VPN access?

Expert Julian Weinberger says limiting user VPN access can help enterprises enforce security and BYOD policies and reduce risk at the same time. Continue Reading

MicroscopeUK

By Simon Quicke Apr 14, 2015

SCC gets access to Rigby Capital operation

The Rigby Group has unveiled a finance and leasing operation that will support SCC and M2 customers Continue Reading

SearchHealthIT

By Reda Chouffani Manage Apr 10, 2015

Wireless healthcare deployments depend on secure access

Reliable coverage, data security and minimal downtime are a few of the elements of a sustainable wireless healthcare infrastructure. Continue Reading

SearchSecurity

By Rob Shapland Get Started Apr 07, 2015

Three reasons to deploy network access control products

Expert Rob Shapland presents use case scenarios that have led to a rise in the adoption of network access control products among enterprises. Continue Reading

SearchSecurity

By Rob Shapland Get Started Apr 06, 2015

Introduction to network access control products in the enterprise

Network access control can keep rogue or compromised devices off of corporate networks. Expert Rob Shapland explains how NAC can benefit enterprises. Continue Reading

SearchNetworking

By Robert Sturt Get Started Nov 18, 2014

What is generic Ethernet access?

Generic Ethernet access is a new carrier service rolling out in the United Kingdom. Is this a technology that can work for you? Continue Reading

SearchExchange

By Steve Goodman Manage Feb 27, 2015

Control Exchange Online access for a more secure organization

Exchange Online's conditional access features gives organizations tighter control over how they keep end users' devices and information safe. Continue Reading

ComputerWeekly

By Warwick Ashford Apr 27, 2015

Obama’s emails accessed in White House breach, say officials

Hackers accessed confidential emails of the US president when they breached White House computer networks in late 2014 Continue Reading

SearchConsumerization

By Bryan Barringer Manage Feb 11, 2015

How much corporate data access should BYOD users have?

Mobile access to company data is one of the surest ways to boost productivity, but IT often has to weigh those benefits against the security risks of bring your own device (BYOD). Continue Reading

SearchExchange

By Steve Goodman Feb 10, 2015

Access Exchange 2013 public folders in a hybrid setup

Organizations that have a hybrid setup with on-premises Exchange 2013 often need a way for users to access Public Folders with mailboxes in the cloud. Continue Reading