March 04, 2015
NoSQL database security has taken a backseat to performance in Hadoop-based security big data analytics systems, but that may soon change thanks to growing demand and maturing NoSQL security products.
November 13, 2013
Georgia Tech's Nick Feamster talks creating a basic SDN controller inspired by routing, and using OpenFlow SDN for access-based control.
October 25, 2013
The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.
March 13, 2006
In this four-part tutorial, SearchExchange.com contributor Brien Posey explains how to create a simple Exchange 2003 public folder tree structure, customize Exchange public folder roles and permissions to suit your company's needs, and automatically propagate Exchange parent public folder permission changes to all child folders.
Authorization Get Started
Bring yourself up to speed with our introductory content
One simple install of the File System Security PowerShell Module can help manage NTFS permissions for user access to folders. Continue Reading
While cloud storage may seem simple, there's a lot to consider to maximize ROI. Make sure security, metadata and management are top of mind. Continue Reading
As the prospect of significant breaches grows, the argument for secure file transfer becomes more compelling—but what exactly are you buying?
At its most basic, file transfer technology is simply a mechanism to transport a file from one system to another system over a network. Secure file transfer also involves some sort of reliable delivery, even if it’s just provided by TCP/IP conventions. Most secure file transfers are based on standard protocols such as the Secure File Transfer Protocol or secure copy.
What makes file transfers confusing is that there are several ways to provide security. The most sophisticated type is known as managed file transfer, and it adds a wide variety of management, auditing, automation, security and reliability features to secure file transfers.
This Buyer’s Essentials Guide reviews the key features in secure file transfer products so readers can make an informed purchase decision. Continue Reading
Evaluate Authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Software testers need database viewing tools that make their job easier, not harder. Here are features non-SQL experts shouldn't be without. Continue Reading
New compliance requirements under PCI DSS version 3.0 strive to make cardholder data security part of companies' everyday business processes. Continue Reading
In a preview of Windows 10 security features, expert Michael Cobb discusses three improvements that will boost enterprise security. Continue Reading
Learn to apply best practices and optimize your operations.
Privileged users pose a growing threat to organizations. Expert Joseph Granneman looks at this insider threat and shares ways to mitigate it. Continue Reading
Authorization and authentication are two security issues to consider when using the AWS Marketplace for applications. Continue Reading
Customized claim rules can be an important way to help your organization handle and enforce its Office 365 access policies. Continue Reading
Problem Solve Authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Radiant Logic's Dieter Schuller says companies trying to master attribute-based access control should start with a hybrid mode. Continue Reading
Virtual applications don't live on machines, so they're easier to manage. Most employees won't notice a difference between virtual and local apps. Continue Reading
Expert Dave Shackleford details cloud storage access control measures that should be in place internally and at storage provider environments. Continue Reading