IT Management  >   Systems Operations  >   Security  >   AAA  >  

3 Factor Authentication

RSS Feed   
3 Factor Authentication Reports
 
Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys

Remote Work Considerations: Securing the New Corporate Network
sponsored by EvolveIP
WHITE PAPER: Today’s environments have embraced SaaS offerings, realizing scalability and cost benefits. However, each additional SaaS provider adds another disparate system to the environment, potentially exposing security vulnerabilities. In this white paper, explore key considerations your security team should make when enabling remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Improving Cybersecurity for Remote Working
sponsored by Mimecast
EBOOK: Many organizations have found themselves in the middle of a work from home trial by fire. What are the security implications of this abrupt change? Which cybersecurity best practices are most critical to make this abrupt change both seamless and secure?Scan this e-book for 13 key recommendations for short and long-term remote work preparation.
Posted: 15 Jul 2020 | Published: 30 Apr 2020

Mimecast

Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi Vantara
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi Vantara

Identity Proofing to Accelerate Customer Acquisition and Onboarding
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As the mobile banking industry grows more competitive, each new application user (or non-user) plays a critical role in the bank’s success. This solution brief takes a closer look at the key features and capabilities of Entrust Datacard’s Identity proofing solution, designed to improve security and customer experience.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

Entrust, Inc.

Security Without Compromise
sponsored by Remediant
CASE STUDY: As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Continuous Authentication as the Zero Trust Multiplier
sponsored by BlackBerry
RESOURCE: The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.
Posted: 10 Jul 2020 | Published: 14 May 2020

BlackBerry

Frost & Sullivan Best Practices Award
sponsored by Onfido
WHITE PAPER: The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Onfido

Phishing Attacks Advanced Techniques That Evade Detection
sponsored by Vade Secure
WHITE PAPER: The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Blueprint: Modern Layered Security
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info