IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed    Add to Google    Add to My Yahoo!
User Authentication Reports
 
Cloud IAM Goes Beyond SSO
sponsored by SailPoint Technologies
WHITE PAPER: With the adoption of cloud IAM on the rise, managing the user's journey, access control, and governance functionality is mandatory. This paper offers 4 challenges that drive cloud IAM adoption and provides invaluable information on cloud access with single-sign-on, access governance and cloud IAM features.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016

OneLogin

Dynamic Authentication
sponsored by iovation, Inc.
WHITE PAPER: It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

iovation, Inc.

Technology Evolves - Your Backup Should Too
sponsored by Acronis
WHITE PAPER: As technology evolves and become more complex, your security stance should too. Explore this white paper to gain insight into how you can boost your security backup strategy to protect against ransomware, stop data loss, and improve compliance and validity of your recovery.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Acronis

GDPR Primer and Readiness Assessment
sponsored by Janrain
RESOURCE: This data sheet provides a GDPR readiness assessment to ensure your organization will achieve compliance by May 2018.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Website Security for Dummies
sponsored by Symantec
WHITE PAPER: In this free e-book, find clear, straightforward guidelines for ensuring airtight website security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

How IAM Addresses Unstructured Content Security Risks
sponsored by STEALTHbits
EGUIDE: Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.
Posted: 11 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement