IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

ACLs

RSS Feed   
ACLs Reports
 
A Computer Weekly e-Guide to IAM
sponsored by ComputerWeekly.com
EGUIDE: We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Continuous Authentication as the Zero Trust Multiplier
sponsored by BlackBerry
RESOURCE: The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.
Posted: 10 Jul 2020 | Published: 14 May 2020

BlackBerry

Webinar - Securing IAM: The New Cloud Perimeter is Broken
sponsored by Palo Alto Networks
WEBCAST: It’s no secret that the cloud is vulnerable, but professionals must become aware of just how vulnerable the cloud can be. In this webinar, learn how one simple misconfiguration in identity and access management allowed researchers to compromise a massively-scaled cloud environment and bypass just about every security control.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

Palo Alto Networks

Micro-Segmentation: The First Step to Zero-Trust Security
sponsored by ColorTokens
RESOURCE: Modern security will see the elimination of adding network layer after network layer to fix security vulnerabilities. Businesses need a tighter security method, one that allows them to control traffic within and between segments. This is the basis of microsegmentation. Read this article to learn why microsegmentation is the way forward.
Posted: 06 Oct 2020 | Published: 23 Mar 2020

ColorTokens

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 07 Oct 2019 | Published: 08 Oct 2019

ComputerWeekly.com

Build vs Buy - Guide to Identity Management
sponsored by Auth0
WHITE PAPER: Learn how you can reap the benefits of an identity management platform, today.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud
sponsored by Ionic Security
PRODUCT OVERVIEW: In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Ionic Security

Mitigating Data Breach Risk with Identity Governance for Files
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: Rather than hope to avoid a breach, preparing for the inevitable occurrence by planning ahead will enable your organization to mitigate potential risks and respond effectively in the event of a breach. This solution brief take’s a closer look at SailPoint’s method for mitigating risk by focusing on access control. Read on to learn more.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

A Framework for Cybersecurity and Compliance
sponsored by OneNeck IT
WHITE PAPER: In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

OneNeck IT

Identity and Access Management Tools to Look Out For
sponsored by Okta
ESSENTIAL GUIDE: Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.
Posted: 05 Apr 2019 | Published: 01 Apr 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences