IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed   
User ID Management White Papers (View All Report Types)
 
Best Practices for Securing Critical Infrastructure for State & Local Governments
sponsored by VMware International Unlimited Company
WHITE PAPER: For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.
Posted: 07 May 2020 | Published: 31 Jan 2020

VMware International Unlimited Company

The Value of Identity Governance for Financial Services
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps you answer three important questions: “who currently has access?”, “who should have access?” and “how is that access being used?”Learn how SailPoint enables you to answer these questions and establish a foundation that is continuously secure and compliant.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

SailPoint Technologies

7 Strategies to Securely Enable Remote Workers
sponsored by BlackBerry
WHITE PAPER: Remote work is becoming a “must-have” job requirement, and security architectures and network protocols are changing as a result. New security methodologies, like zero trust, are being more heavily considered, and network professionals must work to ensure productivity from anywhere. Read this white paper to learn 7 strategies for remote enablement.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

BlackBerry

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Hitachi ID Privileged Access Management
sponsored by Hitachi ID
WHITE PAPER: This white paper identifies why it is essential for public and private sector organizations to select an integrated PAM platform that can secure all types of privileged access. Read on to learn more.
Posted: 02 May 2019 | Published: 02 May 2019

Hitachi ID

Gaining Control Over Cloud IAM Chaos
sponsored by DivvyCloud
WHITE PAPER: Cloud solutions demand identity and access management (IAM)—but with the growing complexity of cloud infrastructure, determining who (or what) has access to a cloud resource can seem impossible. Learn how to restore cloud visibility and regain control over cloud IAM complexity in this guide.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

DivvyCloud

Bring Secure, Frictionless Customer Experiences to Market Faster with Modern CIAM
sponsored by Okta
WHITE PAPER: To meet the security and privacy expectations of today’s customers, organizations need to put their customers’ identity front and center. A customer identity and access management (CIAM) solution can do just that. Learn how Okta Identity Cloud can help you address your IAM and CIAM concerns today and in the future.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Okta

Creating an Identity-Aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Using Zero Trust to Enable Secure Remote Access
sponsored by BlackBerry
WHITE PAPER: As organizations continue to implement zero trust technologies, it’s critical to keep in mind that achieving an effective zero trust access control posture requires careful coordination and organization-wide buy-in. This SANS white paper offers additional expertise, including common challenges and key elements to consider.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

BlackBerry

Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info