Software  >   Systems Software  >   Security Software  >   Network Security Software  >  

Access Control Software

RSS Feed   
ALSO CALLED: Network Access Control Software
DEFINITION: Software that protects a system against unauthorized access.
Access Control Software Reports
1 - 25 of 249 Matches Previous Page  |  Next Page
Using Online Identities in Professional Investigations
sponsored by Pipl
WHITE PAPER: As interactions have become more and more digital, online identities have emerged to replace the traditional notion of a user identity. Read this white paper to learn more about the changing nature of identity and how Pipl leverages online identity data to enhance investigations into today’s cyberthreats.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

OAuth and OpenID Connect - What's Next?
sponsored by Curity AB
WEBCAST: The OAuth 2.0 framework has provided identity professionals open standards for authenticating users, but the world is now mobile, and the way apps are being built is changing. OpenID Connect by Curity is an identity layer on top of the current OAuth protocol that is API-ready for a remote workforce. Watch this webcast to see why this matters now.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

Curity AB

Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

Helping Educators Defend their Web Applications with Amazon & Fortinet
sponsored by Fortinet, Inc.
VIDEO: Today’s distributed organizations operate outside what would be traditionally considered a perimeter. As a result, web application and API security are increasingly becoming the first line of defense for critical business asset. Watch this webinar to unlock exclusive insight regarding web app and API security from leaders at AWS and Fortinet.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Introducing NetMotion SDP
sponsored by NetMotion
RESOURCE: Security teams need uncompromised visibility across all devices, no matter where they are or what network they’re on. In this vein, they also need to prevent unwanted lateral movement across networks by granting access only to necessary applications. Engage this interactive product page where you can absorb the ins and outs of NetMotion SDP.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

NetMotion

Okta + Netskope + CrowdStrike + Proofpoint: Securely Enable Remote Work at Scale
sponsored by Okta
DATA SHEET: Security and access challenges have been magnified by the massive global shift towards remote work. Read this data sheet to see how Okta, Netskope, Crowdstrike and Proofpoint (also known as the Spectra Alliance) combine their efforts to enable organizations to securely enable remote work at scale.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

The Future of CIAM: 4 Trends Shaping Identity and Access Management
sponsored by Okta
WHITE PAPER: As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl

The Neo-Security Architecture
sponsored by Curity AB
WHITE PAPER: The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Curity AB

Adapt to Long-Term Remote Work with Adaptive Access Policies
sponsored by Okta
VIDEO: Last year, organizations scrambled to enable their employees to work remotely – but how are organizations preparing for reality of a decentralized workforce for the long term? Watch this webinar to learn more about sustainable best practices for securing and enabling a remote workforce.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Okta

Surviving Beyond the New Normal: It's More than Securing Your Remote Workers
sponsored by Okta
WEBCAST: In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.
Posted: 14 Jan 2021 | Premiered: Jan 14, 2021

Okta

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

IAM: Globalization & Large-Scale Enterprise
sponsored by IC Consult
WHITE PAPER: A growing number of workloads and IT services are moving to the cloud, and IAM is no exception. Moving IAM to the cloud helps avoid the integration, management and licensing complexity of hybrid IT environments (some workloads running on-prem, others in parallel in the cloud). Download this white paper to explore Identity-as-a-Service (IDaaS).
Posted: 12 Jan 2021 | Published: 12 May 2020

IC Consult

Customer Identity and Access Management – The Master Key for Digital Markets
sponsored by IC Consult
WHITE PAPER: In today’s global market, everything centers on interfaces to customers: Who is the customer? How can their identity be confirmed reliably? Customer identity and access management (CIAM) is helping business answer these questions and more. In this white paper, examine the prerequisites, challenges and opportunities associated with CIAM.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

IC Consult

Keeping Remote Workers Safe and Your Work Secure
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

ID+: A Predictive Analytics Platform for Identity Verification
sponsored by Socure
DATA SHEET: In this data sheet, take a closer look at the top 4 challenges organizations are facing when it comes to identity verification, and discover how ID+, a predictive analytics platform for identity verification, is positioned to help organizations address these issues – read on to learn more about the platform.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Socure

Overcoming the Legacy VPN Dilemma: Zero-Trust Access with Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access models enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Enterprise VPN Software Solutions
sponsored by NetMotion
RESOURCE: Modern approaches to remote access such as SDP are emerging, but most enterprises will continue to need a robust VPN that meets the needs of the increasingly mobile workforce. As such, NetMotion has designed a VPN with a focus in optimizing experience for mobile workers. Access this product page to learn more.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

NetMotion

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

MyID – Replacing Central Access Management with a State-of-the-Art IAM Solution
sponsored by IC Consult
CASE STUDY: Legacy authentication lacks flexibility, availability and security. Businesses are now searching for future-proof solutions that can optimize the flexibility of IT services by providing innovative and secure authentication methods. Peruse this case study to learn how iC Consult provided an enterprise-wide IAM solution through a hybrid cloud.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

IC Consult

Sigma Synthetic Fraud
sponsored by Socure
DATA SHEET: Synthetic identity fraud is continuing to emerge as the next generation of digital fraud and financial theft. The following data sheet provides a closer look at what this threat entails, why it’s been growing and how to best address it – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

A Next-Generation Approach to KYC
sponsored by Socure
WHITE PAPER: While KYC has become an essential practice in the fight against financial crime, programs can often be burdensome and resource intensive. This whitepaper highlights 3 essential elements required for a safe, seamless and successful KYC program – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure
1 - 25 of 249 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info