-
Courion, leaders in identity and access management (IAM), user access control, governance, provisioning and compliance solutions integrated quickly, easily and ...
info.courion.com - 2009-04-08
-
Access Auditor is an identity auditing compliance tool that performs automated reviews of user access rights. We automate access entitlement reviews, ...
www.sccsecurity.com - 2009-02-10
-
Access Auditor is an identity compliance tool that performs automated reviews of user access rights. We automate access entitlement reviews, re-certification, ...
www.securitycompliancecorp.com - 2009-02-05
-
Security DB is a software application that is used by medical facilities to comply with HIPPA mandates that require the tracking of employee computer access ...
employee computer access

exception reports

Lanwizards

Security DB

www.lanwizards.com - 2009-02-04
-
"Absolute User-Identification" turns the #1 Security Vulnerability into Profits deny access, operation OR USE Without Proof-Positive, "Absolute User-ID" ...
www.biometricidentifications.com - 2009-02-08
-
Zarlink employs its formidable analog, digital and mixed-signal capabilities to offer the most compelling products for wired, wireless and optical connectivity ...
www.zarlink.co.uk - 2009-02-08
-
Intodtion to Multipoint VoIP
any-to-any connectivity

application status

bandwidth prioritization

fully managed solution

glbal

Multipoint VoIP

Optical Ring Services

www.mvsdi.com - 2009-02-07
-
Universal Defence - Identity and Access Management
universaldefence.com - 2009-04-10
-
Pages and Items framework for Joomla! CMS
Admin-User-Access

Frontend-User-Access

pages-and-items

usergroup access

www.joomlapi.com - 2009-02-11
-
Identification & Data Security Products for the Cyber Age Credentials that cannot be lost, forgotten, hacked or damaged. On-line shopping is coming soon. ...
www.biometricidproducts.com - 2009-02-08