IT Management  >   Systems Operations  >   Security  >  

Access Authentication and Authorization

RSS Feed   
Access Authentication and Authorization Reports
 
Predictive Identity: A Key Enabler for a Successful Merger or Acquisition
sponsored by SailPoint Technologies
EBOOK: This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

Can Your CIAM Solution Keep Up with the Market?
sponsored by Okta
WEBCAST: Organizations must now respond to increasingly complex requirements to deliver seamless omnichannel experiences for their customers. But they must also work harder to keep sensitive customer data secure. To take customer security to the next level, view this webcast to learn more about customer identity access management.
Posted: 02 Oct 2020 | Premiered: Oct 2, 2020

Okta

Three Ways PKI Can Help Secure the Remote Workforce
sponsored by Sectigo
EBOOK: IT departments have found themselves under pressure to scale networks to support long-term remote work. With this scale comes a slew of network vulnerabilities that traditional identity management strategies may not be able to handle. View this in-depth e-book to learn 3 ways public key infrastructure can help protect remote workers.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo

Would You Bet Your Business On the Strength of Every Employee’s Password?
sponsored by Panda Security
EBOOK: Password misuse and reuse present way too big a risk for password ‘use’ in general. Plus, passwords are not hard to obtain if you have the right hacking skill set – and they’re sought after, running for about $160 apiece on the dark web. If you’re searching for an alternative to passwords, check out this e-book on two-factor authentication.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

Remove Standing Privileges Through a Just-in-Time PAM Approach
sponsored by Remediant
RESOURCE: Privileged access carries a significant risk, and even with privileged access management (PAM) tools in place, the risk of users with standing privileges remains high. Security professionals engaged in identity management may want to implement a zero standing privileges strategy. Read this Gartner article to learn more about why this is critical.
Posted: 17 Aug 2020 | Published: 06 Sep 2019

Remediant

SailPoint Identity Now: Dashboard Overview
sponsored by SailPoint Technologies
VIDEO: In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

The Future of Security and Compliance Starts Here
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

SailPoint Technologies

Identity & Access Management from IBM
sponsored by IBM
RESOURCE: Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in an offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant

4 Actions IT Can Take to Ensure Business Continuity Using PKI Automation
sponsored by Sectigo
EBOOK: Managing risks has never been a greater challenge for IT professionals, and this is especially true when considering identity management. With an increasing number of angles for bad actors to steal passwords, it may be time for an evolution in authentication. Jump into this e-book to learn about public key infrastructure.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info