IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Codes

RSS Feed   
Access Codes Reports
 
IAM for the Real World: Privileged Account Management
sponsored by One Identity
EBOOK: The world of IAM is one of constant change, shrinking deadlines and harsh regulations. This e-book dives into the most pressing IAM issues faced by organizations and offers actionable, affordable and sustainable approaches to combatting these challenges.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER: The moats and castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is simpler, more secure, and a convenient way to protect your enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017

Akamai Technologies

What password security recommendations should businesses adopt?
sponsored by TechTarget
RESOURCE: What happens when authentication and access control measures are attacked by adversaries equipped with machine learning? Users continue to remain vulnerable to hackers, whether being targeted with machine learning or traditional password guessing methods.
Posted: 28 Apr 2018 | Published: 02 Oct 2018

TechTarget

Fighting Fraud with Intelligent Access Management
sponsored by IBM
WHITE PAPER: Find out how you can become a leader in the fight against fraud with intelligent access management and authorization, designed for holistic fraud prevention.
Posted: 24 Jul 2018 | Published: 31 Jul 2016

IBM

A Privileged Access Management Maturity Model for Digital Transformation and Automation at Scale
sponsored by CA Technologies
WHITE PAPER: Access this white paper for an understanding of the opportunities and benefits a privileged access management model could bring to your enterprise as you undergo digital transformation.
Posted: 24 Jul 2018 | Published: 31 May 2017

CA Technologies

SQL Server Security Practices
sponsored by Idera
WHITE PAPER: Explore some common security practices and how your organization can implement security measures within their deployment of SQL Server.
Posted: 11 May 2018 | Published: 11 May 2018

Idera

Protect Legacy Applications without Touching Your Apps with Okta and Palo Alto Networks
sponsored by Okta
VIDEO: Find out the latest trends in credential-based attacks and why every sensitive cloud application needs multi-factor authentication.
Posted: 17 Jul 2018 | Premiered: 31 Oct 2017

Okta

The 10 Universal Truths of Identity and Access Management
sponsored by One Identity
WHITE PAPER: IAM is an ever-moving target that has become a large and integral part of IT operations. Explore this white paper to uncover 10 universal truths of IAM to help you evaluate your need for an IAM approach as well as how to implement and optimize its usage.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

Deploy Silent Security to Protect Identities and future-proof your IAM
sponsored by IBM
WHITE PAPER: Find out how you can deploy silent, nonintrusive identity and access management (IAM) that can weed out the bad actors without hindering employee productivity.
Posted: 24 Jul 2018 | Published: 30 Nov 2017

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement