IT Management  >   Systems Operations  >   Security  >  

3A

RSS Feed   
3A Reports
 
Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

Single sign-on: Understanding the role of SSO in security
sponsored by OneLogin
WHITE PAPER: IT is under pressure to securely support large numbers of apps in a hybrid environment. Passwords are a big problem when it comes to app security because they are difficult for IT to manage. Single sign-on, or SSO, gives users just one password they can use to access all their applications. In this white paper, learn about all things SSO.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation

Identity Insider: Take on the Future
sponsored by SailPoint Technologies
WHITE PAPER: With security such an important topic for literally every person around the world, it's time for people to gain a better understanding of innovations coming to the industry. In the 3rd annual Identity Insider, explore a number of articles which discuss how identity and access management will be affected by innovation in 2020.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

SailPoint Technologies

Securing Hospitality IT Infrastructure
sponsored by CyberArk Software, Inc
WHITE PAPER: When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.
Posted: 26 Aug 2019 | Published: 30 Apr 2019

CyberArk Software, Inc

G Suite Security and Trust
sponsored by Dito
EBOOK: In this e-book, learn how the robust security features in the G Suite are designed to protect your business from threats like major spear-phishing attacks. These features include cutting-edge cloud security, encryption, access and authentication and more.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Dito

The Evolution and Application of Identity Proofing
sponsored by Evident
WHITE PAPER: Technology advancements have changed the landscape of identity proofing, challenging organizations to digitally verify that an individual is who they say they are online. But many businesses are resultant to implement identity proofing. In this white paper, learn why identity proofing is key to avoid risks associated with identity theft.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Evident

How Manulife Is Advancing Its Identity Governance Program with IdentityIQ
sponsored by SailPoint Technologies
CASE STUDY: Manulife is advancing their identity governance program with IdentityIQ. In this case study, learn how Manulife was able to reduce risk, improve customer experience, increase efficiency and plan for the future.
Posted: 30 Aug 2019 | Published: 30 Jun 2019

SailPoint Technologies

Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence
sponsored by Cyber-Ark Software
WHITE PAPER: The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

6 Steps to Achieving Data Access Governance
sponsored by One Identity
WHITE PAPER: Organizations need to satisfy compliance requirements and be able to quickly address security threats. They need to centralize the access request process and put an end to ambiguity about who has access to what. In this white paper, discover how organizations can achieve this by following 6 steps to implement data access governance.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

One Identity
 
Browse by Report Type:
3A White Papers | 3A Multimedia | 3A IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement