Searching all of TechTarget| 74,069 results for "access"

access: Access is simply being able to get to what you need.

See all definition search results provided by

Conversations: Lotus Domino transaction log access

See all conversation search results provided by ITKE.


Nov 25, 2015

Healthcare Data Access Compliance

Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions. Continue Reading


By Dan Sullivan Evaluate Oct 16, 2015

Manage AWS access to control security

AWS administrators can establish encryption keys and user and S3 policies to protect unwanted access to cloud resources. Continue Reading


By Alan R. Earls Manage Nov 16, 2015

AWS cloud access control falls on IT's shoulders

Restricting access to resources and closely governing permissions are solid practices in constructing a secure AWS cloud. While AWS provides tools, admins need to do the legwork. Continue Reading


By Ernie Hayden Problem Solve Nov 16, 2015

Manage vendor access for industrial control systems security

Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading


By Michel De Rooij Get Started Nov 12, 2015

Exchange management roles limit unsolicited admin access

RBAC allows admins to perform certain tasks in Exchange, and the unscoped top-level management roles limit admins authorized to gain access to accounts and scripts. Continue Reading


By Karl Flinders Nov 09, 2015

Access to broadband to be as universal as water and electricity by 2020

The government promises that UK people and businesses will all have access to broadband by the end of the current parliament Continue Reading


By Laurence Hart Get Started Nov 06, 2015

Why information governance strategy equals information access

Information governance strategy needs to facilitate proper collection of information, accommodate human error and legacy systems, and use emerging analytics tools. Continue Reading


By Kurt Marko Manage Aug 31, 2015

Group user access with Amazon IAM

While it is not a fit for every scenario, cloud administrators can save time by establishing access groups for users using AWS Identity and Access Management. Continue Reading


Get Started Sep 24, 2015

Cloud access security brokers: How should enterprises evaluate them?

A proper evaluation of a cloud access security broker is critical to finding the best match for your enterprise's needs. Expert Dan Sullivan outlines key criteria to keep in mind during CASB assessment. Continue Reading


By Stephen J. Bigelow Evaluate Sep 23, 2015

Amazon API Gateway grants access to cloud resources

Connect external applications to AWS products through the Amazon API Gateway, which allows users to define how service requests and transfers are handled. Continue Reading