IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Authentication

RSS Feed   
Access Authentication Reports
 
Access Management Vendors: Analyst Report
sponsored by IBM
RESOURCE: SaaS-delivered access management has become the norm, and vendors are including API capabilities for integrating authentication and authorization into applications and services. Gartner recently published a Magic Quadrant report for Access Management, which evaluates and compares various AM providers. Read on to learn more.
Posted: 14 Nov 2019 | Published: 12 Aug 2019

IBM

Can Cryptography Save Our Elections
sponsored by RSA Conference
RESOURCE: Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.
Posted: 26 Jul 2019 | Published: 23 May 2019

RSA Conference

Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

IBM Identity and Access Management Services: Costs and Benefits
sponsored by IBM
WHITE PAPER: Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.
Posted: 14 Nov 2019 | Published: 30 Jun 2019

IBM

Are Bots Killing Your Business Intelligence?
sponsored by F5 Networks
WHITE PAPER: While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

Top 5 Reasons to Automate Identity Lifecycle
sponsored by Okta
WHITE PAPER: As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Key Steps to Put Your Zero-Trust Security Plan into Action
sponsored by TechTarget
RESOURCE: Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 13 Jul 2019 | Published: 03 Dec 2019

TechTarget

Making the Business Case for Zero Trust Access
sponsored by PortSys
RESOURCE: Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.
Posted: 27 Sep 2019 | Published: 07 Jun 2019

PortSys

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

OneLogin

Discover your Single Sign-On (SSO) and Multi-factor Authentication Security Options
sponsored by TeamViewer
RESOURCE: In this blog post, learn how an identity management platform can help save time for employees, as well as help them understand the importance of creating strong passwords and two-factor authentication.
Posted: 24 Apr 2019 | Published: 24 Apr 2019

TeamViewer
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement