IT Management  >   Systems Operations  >   Security  >  

Access Authentication and Authorization

RSS Feed   
Access Authentication and Authorization Reports
 
Software-Defined Perimeter
sponsored by NetMotion
RESOURCE: Now that remote work is nearly ubiquitous, employees are accessing company resources from a variety of devices and networks. This change widens an organization’s attack surface, and therefore, security teams are researching new technologies to protect networks – for example, the software-defined perimeter (SDP). Read more here.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

NetMotion

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: In the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER: Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020

Cysiv

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

Zero-Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER: The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Armis

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

5 Steps to Secure Home Devices & Improve Productivity for Remote Work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info