IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

ACLs

RSS Feed   
ACLs Reports
 
PKI Offers Better Identity Security Than Typical MFA Solutions
sponsored by Sectigo
RESOURCE: Identity is the new perimeter – how can you best protect the identities of your people, devices, and data? MFA can be effective, but it still leaves vulnerabilities that you must account for. View this infographic to learn why public key infrastructure may provide more robust security than typical MFA.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo

Creating Digital Trust: Anchoring Remote Users to Real Identities
sponsored by Onfido
VIDEO: As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.
Posted: 23 Jul 2020 | Premiered: 03 Jun 2020

Onfido

_beta access: Analyzing Permissions in RACF
sponsored by Beta Systems
VIDEO: Are all of your RACF (resource access control facility) resources properly protected? Have you reduced security risks across the mainframe? Watch this short video to learn how the _beta access Suite strives to simplify the analysis of your environment, so that you can know who has access to what, as opposed to using native RACF.
Posted: 14 Apr 2021 | Premiered: 26 Mar 2021

Beta Systems

SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise
sponsored by SailPoint Technologies
TECHNICAL ARTICLE: The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

SailPoint Technologies

5 steps to secure home devices & improve productivity for remote work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

Axis Security Video 1: Application Access Cloud
sponsored by Axis Security
VIDEO: Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.
Posted: 07 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

The Challenges of Trusted Access in a Cloud-First World
sponsored by Thales
CASE STUDY: The 2020 Thales Access Management Index is a survey of 300 IT professionals across the U.S. and Brazil with responsibility for, or influence over, IT and data security.In this case study, read how these professionals answered questions regarding cloud access management as well as next steps and guidelines for adopting access management solutions.
Posted: 13 Jul 2020 | Published: 30 Jun 2020

Thales

Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security
sponsored by Atakama
RESOURCE: The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020

Atakama
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences