IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed   
2 Factor Authentication Reports
 
Burdens of Homegrown Customer Identity that Hinder Digital Transformation
sponsored by Okta
WHITE PAPER: When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Okta

Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi ID
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi ID

Security Without Compromise
sponsored by Remediant
CASE STUDY: As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Complete Guide to Identity and Access Management
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 07 Dec 2020 | Published: 04 Dec 2018

TOPICS:  Authentication
TechTarget

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Keeping Remote Workers Safe Webcast
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Rules to Stop the 8 Types of Transfer Fraud Losses
sponsored by Feedzai
RESOURCE: Fraud prevention is, by design, a broad term that encompasses any and all efforts to thwart the 8 types of transfer fraud loss. This infographic defines each of these fraud subtypes and offers insight into creating a set of rules for preventing each of them (with examples) – read on to get started.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Feedzai

How to Level Up Your Access Control
sponsored by Aptible
EBOOK: As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

The Guide To Just-In-Time Privileged Access Management
sponsored by BeyondTrust Corporation
EGUIDE: Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BeyondTrust Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info