IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Codes

RSS Feed   
Access Codes Reports
 
How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Scaling Identity Management to Ensure Customer Loyalty Program Success
sponsored by Akamai Technologies
CASE STUDY: In this white paper, find 4 real-world case studies, where leading enterprises across the globe are deploying Akamai Identity Cloud to grow and transform their customer loyalty programs and other membership initiatives.
Posted: 08 May 2019 | Published: 08 May 2019

Akamai Technologies

Cybercriminals Are More Cunning Than Ever: Stay One Step Ahead
sponsored by Lenovo and Intel
RESOURCE: Cybercriminals are more cunning than ever, so it's increasingly important for you to find ways to help your organization stay one step ahead. Learn about ThinkShield by Lenovo and find out how you can keep your devices and data safe.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

Lenovo and Intel

There Are Two Types Of Companies Today: Those that Have Had Security Breaches, And Those That Don't Know they Have.
sponsored by Lenovo and Intel
RESOURCE: The number of cyberattacks is rising every day and criminals are constantly developing more sophisticated and creative ways to expose vulnerabilities. Every device is at risk, and companies must rely on technology providers to "out-innovate" the bad guys. In this infographic and Q&A, explore Lenovo's end-to-end security offerings.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Lenovo and Intel

Evaluating Identity Verification Solutions
sponsored by Onfido
RESOURCE: When evaluating an Identify and Access Management system, there are many criteria to look out for. Download this interactive checklist to help you.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Onfido

Solutions for Privileged Account Resilience
sponsored by One Identity
PODCAST: Tune into this informative podcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.
Posted: 12 Jun 2019 | Premiered: Jun 12, 2019

One Identity

The End of the Password?
sponsored by Onfido
EGUIDE: Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.
Posted: 30 May 2019 | Published: 29 May 2019

Onfido

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Maximizing Security Without Slowing Down the Business
sponsored by Silverfort
PRODUCT OVERVIEW: By verifying the true identity of users in response to threat alerts, Silverfort helps security teams ease alert fatigue by reducing the amount of false-positives. Download this solution brief to learn about step-up authentication.
Posted: 24 May 2019 | Published: 24 May 2019

Silverfort

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement