All resources sponsored by:

SailPoint Technologies

76 - 100 of 106 Matches
Nedbank: From Legacy Identity Tools, to Cutting Edge Identity Governance
sponsored by SailPoint Technologies
CASE STUDY:This case study explores the identity journey Nedbank is on and the path they have taken to generate impactful results leveraging an identity platform. Read on to learn more.
Posted: 17 Sep 2021 | Published: 17 Sep 2021
Get This Now

TOPICS:  .NET

Your Business Runs on Multi-Cloud. Secure it.
sponsored by SailPoint Technologies
DATA SHEET:Moving to the cloud unchecked can leave your organization vulnerable to data exposure, security threats and compliance issues. SailPoint Cloud Access Management aims to give you visibility and control across your IaaS infrastructure and workloads, detect potential anomalies and more. Explore product features and benefits in the data sheet.
Posted: 16 Sep 2021 | Published: 16 Sep 2021
Get This Now

TOPICS:  .NET

Be Secure. Be Compliant. Why Access Management Alone Is Not Enough
sponsored by SailPoint Technologies
EBOOK:Quick authentication places organizations at risk – risk that can only be addressed by identity security that puts proper controls in place and continuously monitors for ‘red flags’ when authenticating. View this e-book to learn how identity security reduces risk by eliminating access management blind spots and maintaining compliance.
Posted: 26 Mar 2021 | Published: 26 Mar 2021
Get This Now


Seeing Identity as the New Firewall
sponsored by SailPoint Technologies
DATA SHEET:If the entry method of choice for malicious actors is the users that connect all your organizational resources, protecting those identities must be your security. Think of your workers as the new perimeter and identity as your new firewall. Learn how to stay protected inside this solution brief.
Posted: 25 Feb 2021 | Published: 25 Feb 2021
Get This Now


Identity in a Zero Trust World
sponsored by SailPoint Technologies
EBOOK:Identity management is pivotal in an organization’s ability to prevent threats and protecting critical data – but how, and where, does Zero Trust fit into today’s identity management strategies? This e-book answers this question, and more – read on to get started.
Posted: 23 Feb 2021 | Published: 23 Feb 2021
Get This Now

TOPICS:  Cybersecurity

Balancing Zero Trust with aStrong AI-driven Identity Strategy
sponsored by SailPoint Technologies
EBOOK:Traditional security methods are unable to handle the high volume (or the devastating consequences) of today’s breaches. Read this e-book to learn about building an AI-driven identity strategy to address these challenges, and discover how Zero Trust fits into the equation.
Posted: 23 Feb 2021 | Published: 23 Feb 2021
Get This Now

TOPICS:  Cybersecurity

Why The Time Is Right To Take A Zero Trust Approach To Security
sponsored by SailPoint Technologies
EBOOK:CISO’s have been floating around the idea of adopting a Zero Trust approach to security for years – but why is now the best time to embrace the benefits of Zero Trust? This e-book provides a comprehensive answer, as well as additional information about Zero Trust security models – read on to get started.
Posted: 23 Feb 2021 | Published: 23 Feb 2021
Get This Now

TOPICS:  Cybersecurity

Protecting Intellectual Property with Data Access Governance
sponsored by SailPoint Technologies
PRODUCT OVERVIEW:In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020
Get This Now


5 Myths About Identity Governance
sponsored by SailPoint Technologies
WHITE PAPER:Some may believe identity is just about governing access to certain applications or systems, but identity is more than access. In this white paper, discover 5 myths about identity governance.
Posted: 18 Mar 2020 | Published: 18 Mar 2020
Get This Now


Mitigating Data Breach Risk with Identity Governance for Files
sponsored by SailPoint Technologies
RESOURCE:Read this brief to learn why the best way to prevent extraneous risk and mitigate how much data is exposed during a breach is to comprehensively secure access to all users, applications, and data stored in files.
Posted: 17 Mar 2020 | Published: 17 Mar 2020
Get This Now


76 - 100 of 106 Matches
Page: 1 2 3 5 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences