Searching all of TechTarget| 72,416 results for "access"

access: Access is simply being able to get to what you need.

See all definition search results provided by

Conversations: Lotus Domino transaction log access

See all conversation search results provided by ITKE.


Manage May 12, 2015


By Scott Sinclair Jul 06, 2015

SDS products boost data preservation, accessibility

Software-defined storage is among innovations that can ease long-term data retention with reliable access to data as hardware changes over time. Continue Reading


By Dan Sullivan Manage Jun 23, 2015

How to define user access controls for cloud content services

As companies move content to the cloud, they need to sort out how to secure access to that information. Continue Reading


By Kevin Beaver Manage Jun 22, 2015

What's the best way to secure VPN access for teleworkers?

The U.S. Postal Service suspended teleworking following a recent breach. Expert Kevin Beaver explains why teleworkers aren't always to blame in the event of a breach and explores methods for secure VPN access. Continue Reading


By Matthew David Manage Jun 12, 2015

How can your enterprise support mobile email access?

Granting mobile email access is easy. Here is a rundown of the options available. Continue Reading


By Rob Shapland Manage May 26, 2015

Secure data in the cloud with AWS identity and access management

The right security policies and technology can make or break an enterprise's identity and access management process. Learn why AWS IAM is crucial when protecting corporate data. Continue Reading


By Kayleigh Bateman May 19, 2015

Women in IT role models need to be more accessible

The few female role models the tech sector does have seem miles apart from young girls in school, says Expedia’s director of technology Continue Reading


By Rob Wright News May 08, 2015

Cloud access security brokers team up with HP, Cisco

Cloud access security brokers Adallom and Elastica recently struck major partnerships with Hewlett-Packard and Cisco, respectively, to improve SaaS security and cloud visibility. Continue Reading


By Craig Mathias Get Started Apr 30, 2015

Five tips for managing guest wireless network access

With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading


By Jake O'Donnell News Jul 02, 2015

Identity access management, EMM ease Office 365 migration

When Carlisle Construction Materials needed help going cloud-first, it turned to Okta not just for IAM but, later, its new EMM suite. Continue Reading