IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed   
Enterprise Single Sign-on Multimedia (View All Report Types)
 
The Vulnerability Epidemic in Mobile Financial Apps
sponsored by Arxan
WEBCAST: A recent study examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection.
Posted: 24 Jul 2019 | Premiered: Jul 24, 2019

Arxan

Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

Zero Trust Access Video
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 13 Aug 2019 | Premiered: 13 Aug 2019

PortSys

EMEA Cybercrime Report 2019 - Key Findings
sponsored by LexisNexis Risk Solutions
WEBCAST: In this webinar, Courtney Austin and Ellie Burns from LexisNexis Risk Solutions discuss key findings from the 2019 EMEA Cybercrime Report. Download the webinar to find out what is fueling cybercrime in the EMEA region.
Posted: 05 Sep 2019 | Premiered: Jul 31, 2019

LexisNexis Risk Solutions

Advanced Breach Protection Demystified
sponsored by Cynet
VIDEO: Organizations are seeking protection against the threats that bypass AV and firewall. The common practice is to upgrade the endpoint protection with EPPEDR or a Network Analytic tool. However, what's common is not necessarily best. Tune into this webinar to learn about on the inherent security gaps in EDREPP and Network Analytics.
Posted: 30 May 2019 | Premiered: 30 May 2019


Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Live Threat Briefing New Attack Trends in Retail
sponsored by Shape Security
WEBCAST: Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.
Posted: 19 Aug 2019 | Premiered: Aug 19, 2019

Shape Security

Understanding Your Attack Surface in AWS (and Other Cloud Providers)
sponsored by Radware
VIDEO: Do you know how your attack surface changes when moving workloads to the public cloud? In this video discussion, learn how you can adapt your security strategy when moving to the public cloud.
Posted: 14 Jun 2019 | Premiered: 14 Jun 2019

Radware

The Future of Digital Onboarding
sponsored by Onfido
VIDEO: Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Tune into this webinar for past and emerging identity trends and how your organization can detect potential fraud.
Posted: 03 Apr 2019 | Premiered: 03 Apr 2019

Onfido

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by Corelight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

Corelight
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement