IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed   
Identity Management Security White Papers (View All Report Types)
A Guide to Securing Cloud Platforms
sponsored by IBM
WHITE PAPER: Organizations transitioning to the cloud or planning hybrid cloud app deployments must supplement traditional perimeter-based network security with protection for cloud-based workloads.Utilize this guide as an approach to effectively securing cloud platforms.
Posted: 01 Mar 2018 | Published: 01 Mar 2018


Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

Top 5 Ways to Relieve the Pain of Managing Hybrid AD Environments
sponsored by One Identity
WHITE PAPER: According to One Identity, nearly 90% of organizations worldwide are using Active Directory (AD) for on-premises resources. This e-book addresses 5 challenges that organizations must overcome as they navigate the transition to a hybrid AD implementation.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

Access Control is Easy
sponsored by One Identity
WHITE PAPER: Effective access control is a matter of well-managed groups. This resource uncovers how to implement and manage Active Directory (AD) groups and dives into why they are at the center of the access control and governance universe.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Getting Started With Attribute Based Access Control
sponsored by Axiomatics
WHITE PAPER: How are you protecting access to your most critical assets? Explore this white paper to gain insight into attribute based access control (ABAC) and uncover 3 major steps to deploying an effective program.
Posted: 14 Feb 2018 | Published: 14 Feb 2018


The Future is Decentralized
sponsored by HYPR
WHITE PAPER: According to the Verizon DBIR, 80% of hacking related breaches are the result of weak or stolen passwords. But large scale data breaches are avoidable. This white paper details why decentralized authentication is the way forward for enterprises wanting to solve this critical security challenge.
Posted: 01 Mar 2018 | Published: 01 Mar 2018


Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012


Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement