IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

ACLs

RSS Feed   
ACLs Reports
 
Ensure That Biometric Authentication Technologies Are Secure
sponsored by Onfido
EGUIDE: Biometrics are often perceived as being more secure than traditional passwords. However, this is not always the case. In this e-guide, learn how researchers at the University of North Carolina at Chapel Hill achieved authentication using a virtual reality model of an authorized user's face.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Onfido

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

Best Practices for Securing Privileged Access
sponsored by Hitachi ID
RESOURCE: In this resource, discover all of the key benefits and capabilities of Hitachi ID's Privileged Access Manager.
Posted: 07 May 2019 | Published: 07 May 2019

Hitachi ID

Episode 3: The Compromise
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how unintentional insider behaviors can lead to credential compromise and wire transfer fraud.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

You Can Get IAM Right
sponsored by One Identity
WHITE PAPER: In this book created exclusively for the RSA Conference, delve into the most pressing IAM issues faced by virtually every organization and sustainable approaches to the IAM challenges you face today.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

One Identity

The Total Economic Impactâ„¢ of the Auth0 Identity Platform
sponsored by Auth0
ANALYST REPORT: Download this Forrester TEI report to better understand the benefits, costs, and risks associated with the AuthO identity platform.
Posted: 05 Oct 2018 | Published: 31 Oct 2017

Auth0

Episode 2: The Attack
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER: This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement