IT Management  >   Systems Operations  >   Security  >  

Access Authentication and Authorization

RSS Feed   
Access Authentication and Authorization Reports
 
Enterprise VPN Software Solutions
sponsored by NetMotion
RESOURCE: Modern approaches to remote access such as SDP are emerging, but most enterprises will continue to need a robust VPN that meets the needs of the increasingly mobile workforce. As such, NetMotion has designed a VPN with a focus in optimizing experience for mobile workers. Access this product page to learn more.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

NetMotion

The Guide To Just-In-Time Privileged Access Management
sponsored by BeyondTrust Corporation
EGUIDE: Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BeyondTrust Corporation

Use Group Rules to Automate & Granularly Manage Access
sponsored by Okta
WEBCAST: Organizations using Okta for IAM know the importance of groups. But managing these groups is a hassle for admins, and it becomes more complicated as the number of users or groups increases, leading to security risks. Watch this webinar to learn how to you can use Okta’s Group Rules to automate app assignments and enforce granular access.
Posted: 01 Mar 2021 | Premiered: Mar 1, 2021

Okta

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

An Executive’s Guide to Finding the Right ID Card Printing Provider
sponsored by HID Global
WHITE PAPER: Selecting the right ID card printing solution or partner can be overwhelming, especially as Secure Card Issuance becomes a priority for security physical access. To help you get started, this e-guide offers insight into the key features and basic requirements to look for in an ID card printer – read on to learn more.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

HID Global

Simplify Card Printing with the Affordable & Efficient HID Fargo INK1000
sponsored by HID Global
EBOOK: This e-book provides a closer look at HID’s FARGO INK100, an affordable, low-maintenance and efficient ID printer designed to provide high quality printing for ID badges, student or faculty IDs, gift and loyalty cards – read on to learn more about the printing technology.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

HID Global

Outbound email security essentials
sponsored by Zivver
WHITE PAPER: As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Zivver

How To Secure Your Vpn – And Then Rethink It Entirely
sponsored by Okta
RESOURCE: For years, VPNs have allowed employees to securely access apps, databases and email systems outside of the corporate network. But as companies enable distributed work from everywhere, VPNs are being reconsidered. Download this infographic to learn how a 4-stage approach to zero-trust security can help you phase out your VPN.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Okta

A Risk-Based Approach to Insider Threat Detection for Federal Government Agencies
sponsored by Merlin International
WHITE PAPER: Malicious insiders, regardless of motive, continue to establish themselves as a major threat, especially amongst United States federal government agencies. This white paper offers comprehensive insights into the role of privileged access management as an effective countermeasure against insider threats – read on to get started.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

Complete Guide to Identity and Access Management
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 07 Dec 2020 | Published: 04 Dec 2018

TOPICS:  Authentication
TechTarget
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info