IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization Codes

RSS Feed   
Authorization Codes White Papers (View All Report Types)
 
Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Janrain

The 10 Universal Truths of Identity and Access Management
sponsored by One Identity
WHITE PAPER: IAM is an ever-moving target that has become a large and integral part of IT operations. Explore this white paper to uncover 10 universal truths of IAM to help you evaluate your need for an IAM approach as well as how to implement and optimize its usage.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Axiomatics

Top Trends That Will Shape CIAM in 2018 and Beyond
sponsored by Janrain
WHITE PAPER: In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Janrain

Key Considerations in Selecting a Customer IAM Solution
sponsored by Janrain
WHITE PAPER: The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

5 Fast Facts for API Access Control
sponsored by Axiomatics
WHITE PAPER: With user access oftentimes being instantaneous, it is difficult for administrators to control sensitive data. This resource outlines 5 key API access control facts as well as insight into how to address the challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Axiomatics

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Cybersecurity for Dummies
sponsored by Thycotic
WHITE PAPER: People are the number one target and cause of cybersecurity failures. Explore this 29-page For Dummies e-book to learn about cybersecurity, how to recognize and respond to threats, and how to protect your company.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Thycotic
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement