IT Management  >   Systems Operations  >   Security  >   AAA  >  

Carrier Identification Codes

RSS Feed   
Carrier Identification Codes White Papers (View All Report Types)
 
Automation First: A Practical Approach to IAM
sponsored by Hitachi ID
WHITE PAPER: This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

Managing Customer & Partner Identities
sponsored by Okta
WHITE PAPER: As a business, the last thing you want to do is make it difficult for users to log in by challenging them with cumbersome authentication processes. IT leaders are transitioning from on-prem identity management solutions to cloud-based identity as a service (IDaaS). Read this white paper to uncover the key functions and benefits of IDaaS.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Getting Started with Zero Trust Never trust, Always Verify
sponsored by Okta
WHITE PAPER: There is no silver bullet when it comes to achieving a zero-trust security architecture, but identity and access management is the core technology that organizations can start with on their Zero Trust journeys. Read on to learn the benefits of Zero Trust and what a framework looks like today.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Okta

Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Okta Identity Management for Portals Built on Salesforce.com
sponsored by Okta
WHITE PAPER: Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013

RSA

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement