IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed   
User Provisioning Multimedia (View All Report Types)
 
Top 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth Taking
sponsored by RSA Conference
WEBCAST: Designing secure architecture can always be more expensive, time consuming and complicated. But does it make sense to cut corners when hackers invent new attacks every day? Sooner or later, these shortcuts will translate to more harm and backfire. Watch this video from RSA Conference 2019 to learn how to eliminate mistakes.
Posted: 31 Jul 2019 | Premiered: Mar 5, 2019

RSA Conference

TeamViewer Tensor Integration Webinar
sponsored by TeamViewer
WEBCAST: TeamViewer Tensor has changed the paradigm of remote connectivity by allowing you to assign appropriate user access rights to employees so they can get full desktop access to their work computers and network servers. In this webcast, explore key benefits of TeamViewer Tensor.
Posted: 28 May 2019 | Premiered: May 28, 2019

TeamViewer

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys

Establish Secure DevOps Practices
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

What Really Happened with the Capital One Attack and How to Prevent it
sponsored by Aporeto
WEBCAST: The Capital One data breach on July 30, 2019 was due to the exploitation of a well-known class of security vulnerabilities that are based on security relying on credentials. In this video, listen as Aporeto CTO, Dimitri Stiliadis discusses the root cause and how to prevent a breach with Aporeto.
Posted: 18 Oct 2019 | Premiered: Oct 18, 2019

Aporeto

CyberArk Privilege Cloud Whiteboard Video
sponsored by CyberArk Software, Inc
VIDEO: CyberArk Privilege Cloud can help your organization discover and manage privileged credentials on-premises, in the cloud, and hybrid environments. In this video, Andrew Silberman from CyberArk discusses the benefits of CyberArk Privilege Cloud and helps you evaluate if it is a good fit for your organization.
Posted: 24 Oct 2019 | Premiered: 24 Oct 2019

CyberArk Software, Inc

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO: This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

Remote Replication of an Oracle 10g Database Using Continuous Access/EVA
sponsored by Hewlett Packard Enterprise
WEBCAST: View this Webcast to learn best practices for deploying remote replication of an Oracle database. Discover how to properly manage replication so it will positively affect database performance.
Posted: 24 Oct 2007 | Premiered: Jul 12, 2007, 11:00 EDT (15:00 GMT)

Hewlett Packard Enterprise

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Shouldn't Single Sign-on Be Child's Play?
sponsored by Microsoft & Quest Software
WEBCAST: Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
Posted: 10 Oct 2008 | Premiered: Nov 4, 2008, 14:00 EST (19:00 GMT)

Microsoft & Quest Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement