Searched for: "best practices in authentication and access control"
- Networking (9)
- Security (9)
- Software (8)
- Data Centers (5)
- Microsoft (5)
- Apple (2)
- Cloud (2)
- Enterprise Software (2)
- Google (2)
- Hardware (2)
- Open Source (2)
- Social Enterprise (2)
- Storage (2)
- After Hours (1)
- Big Data (1)
- Cxo (1)
- Data Management (1)
- Developer (1)
- Printers (1)
- Smbs (1)
- Virtualization (1)
About 60 results for "best practices in authentication and access control"
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...
CenturyLink's new data center in Minnesota offers innovation along with standard best practices. Michael P. Kassner shares what he learned about the facility during a recent tour.
Jesus Vigo walks through the steps of configuring Profile Manager settings in OS X Server for MDM use.
Google Glass provides interesting potential, but it can also be susceptible to vulnerabilities.
Virtual Desktop Integration is a sweeping trend with tangible results. It's not without a few pitfalls as well, however. Learn some mistakes to avoid in your VDI implementation.
Jesus Vigo offers a tutorial on managing user and group accounts in Apple OS X Server.
Microsoft's Windows Azure Infrastructure Services is now generally available -- and its Virtual Network technology could be your ticket to deploying a secure hybrid cloud model.
In-house file servers can carry a hefty price tag, but that does not always mean Google Drive can alleviate these costs.
Sending file attachments through email is so 1999. Make the switch to share documents using Google Drive and reap the benefits.
In this paper, the authors present a study on the challenges and issues of security in Cloud computing. First they look into the critical fifteen domains in Cloud security, namely ...