IT Management  >   Systems Operations  >   Security  >  

3A

RSS Feed   
3A Reports
 
Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi ID
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi ID

On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Complete Guide to Identity and Access Management
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 07 Dec 2020 | Published: 04 Dec 2018

TOPICS:  Authentication
TechTarget

Complete Guide to Identity and Access Management
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 25 Mar 2021 | Published: 19 Jun 2020

TechTarget

Peer Insights: Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER: This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019

Beta Systems

Understanding Your Options: ID Card Printing for Higher Education
sponsored by HID Global
WHITE PAPER: For colleges and universities, ID cards play a critical role in granting students and faculty access to the resources they need to excel. This white paper explores 10 key considerations for higher education institutions looking to establish a partnership with the right ID cart printing partner for their unique needs.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

HID Global

IT Priorities 2020: After Covid-19, security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

ComputerWeekly.com

Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security
sponsored by Atakama
RESOURCE: The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020

Atakama

Overcoming the Challenges of Managing ID Card Issuance
sponsored by HID Global
RESOURCE: ID card issuance is a complex task. You must ensure the security of data, manage locally-installed software and keep track of printer supply levels. On legacy systems, these processes are only made more difficult. The good news? There’s an innovative ID card issuance program to help you overcome these challenges. Open this infographic for details.
Posted: 01 Sep 2020 | Published: 31 Jul 2020

HID Global
 
Browse by Report Type:
3A White Papers | 3A Multimedia | 3A IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences