All resources sponsored by:

One Identity

1 - 25 of 30 Matches
6 Steps to Achieving Data Access Governance
sponsored by One Identity
WHITE PAPER:Organizations need to satisfy compliance requirements and be able to quickly address security threats. They need to centralize the access request process and put an end to ambiguity about who has access to what. In this white paper, discover how organizations can achieve this by following 6 steps to implement data access governance.
Posted: 29 Aug 2019 | Published: 29 Aug 2019
Get This Now


Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
WHITE PAPER:This white paper evaluates what IAM for the real world would, should and can look like. It delves into the most pressing IAM issues faced by virtually every organization and offers actionable, affordable and sustainable approaches to the challenges you face. Read on to learn more.
Posted: 29 Aug 2019 | Published: 29 Aug 2019
Get This Now


Strategies to Ensure Success for your Governance Project
sponsored by One Identity
EBOOK:In years past when talking about IAM, the hot topics were single sign-on and role-based access control. However, governance is the goal now, and many organizations are finding it hard to reach. Learn about Identity and Access Governance (IAG), why it's important and how your organization can make an IAG program successful.
Posted: 28 Aug 2019 | Published: 28 Aug 2019
Get This Now


8 Best Practices for Identity and Access Management
sponsored by One Identity
WHITE PAPER:In this white paper, find 8 key practices that can help you improve your identity management system to ensure better security, efficiency and compliance.
Posted: 28 Aug 2019 | Published: 28 Aug 2019
Get This Now


Understanding Privileged Identity Theft
sponsored by One Identity
WHITE PAPER:Privileged Identity Theft is a widespread technique in some of the largest data breaches and cyberattacks. In this white paper, learn why privileged identities pose such a risk to enterprises and how your organization can protect itself.
Posted: 27 Aug 2019 | Published: 27 Aug 2019
Get This Now


The Journey to IAM Success
sponsored by One Identity
EBOOK:In this e-book, read about the IAM journey that 6 organizations have made - and how One Identity helped them reach their goals.
Posted: 05 Aug 2019 | Published: 05 Aug 2019
Get This Now


Providing the Right Privileged Access to Get the Job Done
sponsored by One Identity
CASE STUDY:In this case study, learn how Cavium, a processor manufacturer used One Identity Safeguard and Active Roles Simplify and secure access to privileged credentials, Automate password changes to reduce exposure for passwords being stolen or misused, and much more.
Posted: 26 Mar 2019 | Published: 26 Mar 2019
Get This Now


The Breach Prevention Playbook
sponsored by One Identity
WHITE PAPER:Today's breaches leave us knowing that IAM and password security is more important than ever before. In this e-book, discover IAM practices and technologies that can bolster your chances of not only surviving the inevitable breach but enabling your organization to emerge with minimal damage.
Posted: 25 Mar 2019 | Published: 25 Mar 2019
Get This Now


Log Management Essentials
sponsored by One Identity
WHITE PAPER:In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.
Posted: 18 Mar 2019 | Published: 18 Mar 2019
Get This Now


How to Forward Log Messages to Splunk From syslog-ng
sponsored by One Identity
WHITE PAPER:Splunk is a popular search and analysis platform. Many users of Splunk have also deployed syslog-ng in their environments to help with tasks like collecting and centralizing log messages from network devices. In this white paper, learn about 5 use cases for syslog-ng and how to get them started.
Posted: 18 Mar 2019 | Published: 18 Mar 2019
Get This Now


NIST Cybersecurity Framework
sponsored by One Identity
WHITE PAPER:This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.
Posted: 18 Mar 2019 | Published: 18 Mar 2019
Get This Now


Storing Logs in Elasticsearch Using Syslog-ng
sponsored by One Identity
WHITE PAPER:Elasticsearch is a scalable, searchable NoSQL DB that boasts a main appeal of syslog-ng capabilities (a high-performance log collector that works with data coming from a wide variety of sources). Read this white paper to learn more about Elasticsearch and why you may want it to process your logs.
Posted: 15 Mar 2019 | Published: 31 Dec 2018
Get This Now


Logging in Docker using syslog-ng
sponsored by One Identity
WHITE PAPER:There are many use cases for containers, but have you considered containerization of your central log server? In this whitepaper, find a demonstration for containerizing your event logging, and learn why Docker is the go-to choice for central log servers.
Posted: 15 Mar 2019 | Published: 31 Dec 2018
Get This Now

TOPICS:  Log Management

Optimizing SIEM
sponsored by One Identity
WHITE PAPER:SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.
Posted: 15 Mar 2019 | Published: 15 Mar 2019
Get This Now


Message Classification with syslog-ng
sponsored by One Identity
WHITE PAPER:Log messages can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations. Read this white paper to find out how system logging can help ease the burden of system administrators and see how you can simplify your logging architecture with syslog-ng.
Posted: 14 Mar 2019 | Published: 14 Mar 2019
Get This Now


The 10 Universal Truths of Identity and Access Management
sponsored by One Identity
WHITE PAPER:IAM is an ever-moving target that has become a large and integral part of IT operations. In this white paper, discover 10 universal truths of IAM and how you can evaluate your need, implement a solid IAM solution and optimize its usage.
Posted: 13 Mar 2019 | Published: 13 Mar 2019
Get This Now


Protecting the Data of Refugees and Those Who Help Them
sponsored by One Identity
CASE STUDY:Danish Refugee Council (DRC) wanted to standardize the management of their Active Directory. After evaluating options, DRC deployed One Identity Active Roles. In this case study, learn how DRC was able to increase their control and insight over system access, simplify compliance, save at least 10,000 hours of effort manually, and more.
Posted: 12 Mar 2019 | Published: 12 Mar 2019
Get This Now


You Can Get IAM Right
sponsored by One Identity
WHITE PAPER:In this book created exclusively for the RSA Conference, delve into the most pressing IAM issues faced by virtually every organization and sustainable approaches to the IAM challenges you face today.
Posted: 12 Mar 2019 | Published: 12 Mar 2019
Get This Now


Is Biometrics the Future of Security?
sponsored by One Identity
WHITE PAPER:Biometrics is the automated recognition of individuals based on their behavioral and biological characteristics. Learn why it's important to your business's security and why passwords may not be unique enough anymore.
Posted: 21 Aug 2018 | Published: 21 Aug 2018
Get This Now


The 12 Essential Tasks of Active Directory Domain Services
sponsored by One Identity
WHITE PAPER:This resource outlines the 12 essential tasks of Active Directory (AD) Domain Services and how utilizing AD can help improve your security needs.
Posted: 16 Feb 2018 | Published: 16 Feb 2018
Get This Now


Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER:Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018
Get This Now


Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER:One of the most important aspects of an IAM program is the securing, management and governance of privileged accounts. This resource uncovers strategies for successfully managing privileged accounts in order to improve your IAM approach.
Posted: 14 Feb 2018 | Published: 14 Feb 2018
Get This Now


Azure Active Directory vs. Classic AD
sponsored by One Identity
ESSENTIAL GUIDE:Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.
Posted: 13 Mar 2019 | Published: 11 Mar 2019
Get This Now


Easy Active Directory Clean-Up Tips
sponsored by One Identity
ESSENTIAL GUIDE:Inside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.
Posted: 13 Mar 2019 | Published: 11 Mar 2019
Get This Now


Go Back to the Basics with Active Directory
sponsored by One Identity
ESSENTIAL GUIDE:Despite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.
Posted: 12 Mar 2019 | Published: 11 Mar 2019
Get This Now


1 - 25 of 30 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement