IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed   
Access Control Lists Reports
 
Ultimate Guide to Customer IAM
sponsored by Ping Identity Corporation
EBOOK: Understanding the opportunities that CIAM brings, how it’s different than enterprise IAM and how to choose and implement a CIAM solution may seem like a daunting task. This guide will put you on the right path to selecting the best CIAM solution for your enterprise.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Ping Identity Corporation

Data Security with Okta and Netskope
sponsored by Okta + Netspoke
RESOURCE: As organizations continue to embrace the productivity and cost benefits of cloud capabilities, it’s now more important than ever the make sure the right security checks are in place to secure sensitive data. Read this blog post to discover the common points of failure, explore what a CASB is (and how it can help), and more.
Posted: 27 May 2020 | Published: 18 Jul 2018

Okta + Netspoke

Fuze: Unified Communications Security
sponsored by Fuze
WHITE PAPER: Security and privacy requirements are extremely important when it comes to business communications. In this white paper, learn how a defense-in-depth approach is employed across the Fuze platform whereby multiple layers of security work together to deliver reliable service in a trusted environment.
Posted: 21 May 2020 | Published: 21 May 2020

Fuze

Secure Transformation: Replacing Remote Access VPN with Prisma Access
sponsored by Palo Alto Networks
WHITE PAPER: Remote access VPN has been an enterprise network staple for years; however, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. In this white paper, learn about the limitations of VPNs and how Prisma Access can help provide secure access to all applications.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Palo Alto Networks

The Latest Trends in Advanced Authentication Solutions
sponsored by HID Global
WHITE PAPER: It’s estimated that the cost of breaches, identity theft and other cybercrimes will reach $6 trillion by 2021, doubling their cost from 2015. In order to combat these threats, organizations are embracing identity and access management (IAM) to protect sensitive data. Read on to learn more about the latest IAM threats and trends.
Posted: 27 Apr 2020 | Published: 27 Jan 2020

HID Global

Access Management Handbook
sponsored by Thales
EBOOK: The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.
Posted: 23 Mar 2020 | Published: 30 Sep 2019

Thales

The Department of Transport Turns to Ivanti for ASD Top 4 Compliance
sponsored by Ivanti ANZ
CASE STUDY: Given the distributed nature of the Victoria, Australia’s Department of Transport, a holistic security program was needed in order to address challenges related to patching, unauthorized access and regulatory compliance. In this case study, discover how they partnered with Ivanti to address these security and compliance challenges.
Posted: 20 Apr 2020 | Published: 30 Nov 2019

Ivanti ANZ

Alero Showcase
sponsored by CyberArk Software, Inc
VIDEO: In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO: Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020

Thales

Passwordless Authentication: How Giving Up Passwords Can Improve Security
sponsored by Thales
WHITE PAPER: Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info