Your search for access control returned 184 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Review 2013 Industry Innovators: Access control

2013 Industry Innovators: Access control

Access control is, arguably, the key aspect of information protection.

Report Access control has many dimensions

Access control has many dimensions

This month we will look into three more. Identity management and network access control (NAC) are fairly obvious, while data leakage prevention (DLP) is, perhaps, not.

Product Review StillSecure Safe Access v6.1

StillSecure Safe Access v6.1

Safe Access from StillSecure is a feature-rich network access control appliance that can detect and monitor many types of endpoints throughout the network and ensure they comply with the enterprise policy before access to network resources is granted

Product Review Avatier Identity Management Suite (AIMS) v9

Avatier Identity Management Suite (AIMS) v9

AIMS provides a complete set of identity management (IdM), network access control (NAC) and data leakage prevention (DLP) features.

Group Test

Identity management

Tools for data leakage prevention, identity management and network access control form a layered ecosystem to help prevent attacks and exfiltration of assets, says Peter Stephenson.

Product Review Centrify Suite 2013.2 Platinum Edition

Centrify Suite 2013.2 Platinum Edition

By leveraging an existing infrastructure enterprise, Centrify Suite 2013.2 Platinum Edition provides central control and securing and auditing of user access through cross-platform systems, mobile devices and applications.

Webcast

Next Generation NAC: Advancing Control Intelligence and Security Management

Today's Network Access Control (NAC) technology has evolved well beyond that of allowing or denying network admission. The latest generation of NAC solutions addresses numerous security and compliance applications, but more so, help organizations enhance operational awareness, efficiency and use of their existing network and security infrastructure.

Webcast 20/20 Webcast: Keeping data safe in the cloud

20/20 Webcast: Keeping data safe in the cloud

Cloud services have become ubiquitous. Many organizations, though, having embraced their various benefits, sometimes have overlooked some of their problems - including those that can arise because of security weaknesses, as a recent SC Magazine survey, which was sponsored by McAfee, has further affirmed. There are a slew of worries...

Webcast How Healthcare IT Is Securing Innovative Patient Care

How Healthcare IT Is Securing Innovative Patient Care

Healthcare IT must satisfy a myriad of compliance mandates, enable employee and non-employee caregiver use of latest personal mobile and medical devices, and protect network operations and sensitive information - all while optimizing resources and costs? How are innovative security professionals supporting patient care priorities while mitigating access, privacy...

News

Linkup ransomware blocks internet access, mines Bitcoins

A trojan variant, Linkup, identified by Emsisoft, takes control of DNS servers, blocks internet access and mines Bitcoins.

Brief

Credentials for thousands of FTP sites compromised, NYTimes among impacted

Hackers were able to access the credentials for more than 7,000 file transfer protocol (FTP) sites and, in some instances, upload malware to affected FTP servers.

Brief

Justin Bieber's Twitter account hacked

An unknown attacker accessed the pop singer's account for about 15 minutes mid-afternoon on Saturday and tweeted multiple times before Bieber's team regained control.

Opinion Combatting insider threats

Combatting insider threats

We must stop the insanity by focusing on the data and controlling privileged user access.

Opinion How to breeze through your next compliance audit

How to breeze through your next compliance audit

In a perfect world, enterprises would know exactly when an auditor is going to show up, the questions they will ask, and data would be presented on a silver platter ready to prove the organization's compliance.

News For about $40, "binder" tool weaponizes Android apps for you

For about $40, "binder" tool weaponizes Android apps for you

The AndroRAT APK Binder is being sold on underground forums, giving online vandals with little to no skill an easy way to "trojanize" legitimate apps.

Opinion Learning from the learners

Learning from the learners

Our educational institutions continue to set the pace in BYOD.

News

Remote access trojan targets Middle East-based energy and government sectors

Attackers are using malware, called "njRAT," to hijack victims' computers and spread to others in the organization.

News HHS reveals "high-risk" security issues at Medicaid agencies

HHS reveals "high-risk" security issues at Medicaid agencies

An HHS report, based on audits between 2010 and 2012, noted serious vulnerabilities affecting 10 state Medicaid agencies.

Case Study Campus access: Case study

Campus access: Case study

A Utah university found a solution to enable secure access to the campus network - while cutting down on help desk calls, reports Greg Masters.

Brief

Teenage researcher develops first malware for mobile Firefox OS

Shantanu Gawde, a 17-year-old security researcher, has become the first person to infect the newly released mobile Firefox OS with malware.

Page 1 of 10

Sign up to our newsletters

POLL