IT Management  >   Systems Operations  >   Security  >   AAA  >  

3 Factor Authentication

RSS Feed   
3 Factor Authentication Reports
 
Managing Identity So You Can Scale
sponsored by Okta
WHITE PAPER: Today’s users expect an experience that is not only frictionless and personalized, but also secure. To meet this demand, organizations are turning to customer identity and access management (CIAM) tools. Read this white paper to learn more about Okta’s CIAM offering and how it’s benefitted some of their key partners.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Okta

University Hospital Gets the Most Out of Mobility with Total Access Control
sponsored by PortSys
CASE STUDY: For Milton Keynes University Hospital (MKUH), enabling and securing access for every device, regardless of location, became critical as they looked to modernize their operations. In this case study, discover why MKUH decided to partner with PortSys and implement a zero-trust approach to access management in the form of Total Access Control.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

PortSys

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

SailPoint Identity Now: Certification Process Overview
sponsored by SailPoint Technologies
VIDEO: In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

New Account Fraud: Uncovering the Tools And Tactics Of A New Breed Of Scams
sponsored by Buguroo
WHITE PAPER: To enhance customer experience, banks are closing branches in favor of digital services to meet the growing demand of tech-savvy users. A big risk of this change is new account fraud, which is a cyber scam where bad actors use stolen or synthetic identities to open accounts and borrow money. Read this white paper to get a closer look.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Buguroo

Endpoint Security: Protecting Your Business Wherever It Goes
sponsored by Dell SecureWorks
WHITE PAPER: The spread of COVID-19 forcing organizations to quickly shift towards working from home introduced a litany of new endpoint security risks while also amplifying existing ones. Read this white paper for a closer look at these challenges and best practices for addressing them.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

6 Key Identity and Access Management (IAM) Benefits
sponsored by BIO-key International
EGUIDE: Identity and access management (IAM) has become one of the most effective ways to provision, manage and secure access to an organizations sensitive data. In this e-guide, 6 Key Identity and Access Management (IAM) Benefits, discover 6 observable benefits that users, admins and organizations can realize with an effective IAM program.
Posted: 28 Oct 2020 | Published: 26 Oct 2020

BIO-key International

Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi ID
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi ID

EMA Evaluation Guide to Privileged Access Management (PAM)
sponsored by Remediant
WHITE PAPER: Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Remediant

What is Okta Access Gateway
sponsored by Okta
VIDEO: Securely connecting users to applications isn’t a new problem. Historically, organizations opted for on-premise single sign-on (SSO) tools to address this. However, SSO tools are unable to meet the security and scalability needs of today’s hybrid IT environments. Watch this video to see how Okta addresses this need.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info