IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Codes

RSS Feed    Add to Google    Add to My Yahoo!
Access Codes Reports
 
Assigning Risk Levels & Choosing Authentication Policies
sponsored by Identity Automation
EBOOK: Different types of employees carry different levels of risk. But how do you know the appropriate level of risk for any given employee? This resource reveals tactics for assigning appropriate risk levels and choosing authentication policies to ensure successful security within your enterprise.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016

OneLogin

Who Owns Your Data?
sponsored by SailPoint Technologies
EBOOK: 7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

The Importance of the Facilitated Password Process for Enterprise Password Management
sponsored by Fast Pass Corp
WHITE PAPER: According to the 2017 Verizon Data Breach Investigations Report, 81% of hacking related breaches leveraged stolen or weak passwords. Explore this password management white paper to gain insight into securing your passwords to protect your organization from hackers.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

4 Companies Seek Password Security Management
sponsored by Fast Pass Corp
CASE STUDY: Explore this case study to learn about how 4 companies implemented a password management strategy to improve their overall password security. Through this case study, uncover core benefits the companies experienced.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Fast Pass Corp

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

Credential Stuffing a Security Epidemic
sponsored by F5 Networks
WHITE PAPER: 81% of hacking-related breaches include leveraging of usernames and passwords, according to the 2017 Verizon DBIR. This e-book provides insight into credential stuffing attacks as well as a guide to stopping credential theft.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Take Control of Virtual Desktop Access with Two-Factor Authentication
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement