IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed   
2 Factor Authentication Reports
 
On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Outbound email security essentials
sponsored by Zivver
WHITE PAPER: As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Zivver

Introducing NetMotion SDP
sponsored by NetMotion
RESOURCE: Security teams need uncompromised visibility across all devices, no matter where they are or what network they’re on. In this vein, they also need to prevent unwanted lateral movement across networks by granting access only to necessary applications. Engage this interactive product page where you can absorb the ins and outs of NetMotion SDP.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

NetMotion

Report, Zero Trust: What You Need to Know to Secure Your Data and Networks
sponsored by Gigamon
ANALYST REPORT: Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it’s time to rethink strategy. As Gigamon’s new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security.
Posted: 15 Sep 2020 | Published: 31 Mar 2020

Gigamon

Financial Services
sponsored by Hitachi ID
PRODUCT OVERVIEW: Given increasingly stringent compliance mandates within the financial industry, it’s no surprise that managing risk and maintaining compliance are top of mind – especially when it comes to authentication or IAM programs. Read this solution brief to see how Hitachi ID is helping financial organizations meet their privacy and compliance needs.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Hitachi ID

Eighth Annual Fraud Report
sponsored by IDology
RESEARCH CONTENT: Like changes in the market, cyberthreats evolve and change each year – especially with threats like fraud. This research report from IDology highlights how fraud evolved in 2020 and provides key insight into how events like COVID impacted fraud. Read on to unlock the full report.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

IDology

Keeper Business Datasheet
sponsored by Keeper Security Inc
DATA SHEET: 81% of data breaches are due to weak, default or stolen passwords – a massive vulnerability that could be addressed with effective password management. In this data sheet, take a closer look at the key features and benefits of Keeper’s password management offering.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

Security: Creating Trust in a Zero Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

Security Without Compromise
sponsored by Remediant
CASE STUDY: As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Multifactor authentication methods, use cases and products
sponsored by SearchSecurity.com
EBOOK: Multifactor authentication protects businesses from cyberattacks by requiring two or more forms of authentication from the user before allowing access. In this buyer's guide, explore multifactor authentication methods, use cases and market-leading products before making a final buying decision.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences