IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed   
2 Factor Authentication Reports
 
Zero Trust: Adopting, Building and Managing your Strategy
sponsored by TechTarget
RESOURCE: Today's security landscape is more hostile than ever before. Threats are evolving at an unprecedented rate, and it's up to security professionals to face the challenge. The Complete Zero Trust Handbook offers guidance into what is the most effective defense against modern threats. Complete our survey to secure your free copy.
Posted: 11 Aug 2020 | Published: 10 Sep 2020

TechTarget

Access management: An evaluation and comparison of vendors
sponsored by IBM
RESOURCE: SaaS-delivered access management has become the norm – enabling organizations to provision or prohibit access throughout their dynamic networks. This Gartner Magic Quadrant Report provides an unbiased evaluation of key vendors and offerings within the access management landscape. Download this report to see who were crowned as leaders.
Posted: 07 Aug 2020 | Published: 12 Aug 2019

IBM

University Hospital Gets the Most Out of Mobility with Total Access Control
sponsored by PortSys
CASE STUDY: For Milton Keynes University Hospital (MKUH), enabling and securing access for every device, regardless of location, became critical as they looked to modernize their operations. In this case study, discover why MKUH decided to partner with PortSys and implement a zero-trust approach to access management in the form of Total Access Control.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

PortSys

Outbound Email Security Essentials
sponsored by Zivver
WHITE PAPER: As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Zivver

Microsoft Office 365 Security, SASE, and Zero Trust
sponsored by InteliSecure
EBOOK: Along with the latest security innovation from Microsoft - Office 365 Security - businesses are considering a SASE platform and zero trust architecture to further push their networks to the edge of security. With these developments, IT professionals are asking, ‘Why is this better than what we have in place?’ View this e-book to learn the answer.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

InteliSecure

5 Reasons your SMB workspace needs simple SSO
sponsored by Citrix
EBOOK: SSO should make life easier for both IT and employees. But when new apps require different SSO tools from different vendors, it can complicate your IT. Adopting simple, unified SSO for your workspace can ensure secure, anywhere access to all essential applications.This e-book gives five reasons why your organization needs simple, unified SSO.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

2019 Report for Identity Governance & Administration
sponsored by IBM
RESOURCE: For the fifth consecutive year, Gartner has named IBM a Leader in the Magic Quadrant for Identity Governance & Administration (IGA). With IBM, clients have access to the broadest set of IGA capabilities on their journey to the cloud.
Posted: 07 Aug 2020 | Published: 09 Oct 2019

IBM

Cybersecurity Risk: A Board’s-Eye View Chapter 4
sponsored by PortSys
WHITE PAPER: Access control is now the single most important aspect of an organization’s security architecture. What if you could view the context of a user’s access request, then have that request analyzed against your security policies for authentication? Read this brief to look at Total Access Control by PortSys.
Posted: 29 Sep 2020 | Published: 01 Aug 2020

PortSys

How to Secure Your Remote Workforce Effectively
sponsored by BlackBerry
EBOOK: Remote working capabilities enable organizations to support a global workforce – and if done effectively it can yield benefits related to efficiency, flexibility and cost-effectiveness without sacrificing security. Read this eBook to learn how to secure remote workforces.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

BlackBerry

Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info