IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Authentication

RSS Feed   
Access Authentication Reports
 
Context-Aware Security Provides Next-Generation Protection
sponsored by Citrix
RESOURCE: Cybersecurity is among the most important board-level issues for nearly every organization. In this article, learn more about next-generation security strategies. These strategies are driven by personalized cyberdefenses based on what each user typically does and what information and application each user regularly works with.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

Citrix

How the University of Sunderland Simplified and Enables Mobility and BYOD
sponsored by Ignition Technology Ltd
CASE STUDY: The University of Sunderland was looking for a platform that assured users are who they say they are while still being incredibly easy to use for all members of the university community. In this case study, learn how Duo allowed the university to do this while reducing the impact of cyberattacks.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Ignition Technology Ltd

Single sign-on: Understanding the role of SSO in security
sponsored by OneLogin
WHITE PAPER: IT is under pressure to securely support large numbers of apps in a hybrid environment. Passwords are a big problem when it comes to app security because they are difficult for IT to manage. Single sign-on, or SSO, gives users just one password they can use to access all their applications. In this white paper, learn about all things SSO.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

Can Cryptography Save Our Elections
sponsored by RSA Conference
RESOURCE: Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.
Posted: 26 Jul 2019 | Published: 23 May 2019

RSA Conference

Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER: One of the most important aspects of an IAM program is the securing, management and governance of privileged accounts. This resource uncovers strategies for successfully managing privileged accounts in order to improve your IAM approach.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys

Five Steps To A Zero Trust Network
sponsored by Optiv
ANALYST REPORT: This Forrester report gives security and risk leaders best practices and a 5-step road map to realize the benefits of a Zero Trust strategy more quickly. Read on to learn more.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Optiv

Take a Better TAC to Protect RDP
sponsored by PortSys
RESOURCE: Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement