Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023
|
|
|
Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Many organizations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023
|
|
|
5 types of data security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
Posted: 09 Feb 2023 | Published: 09 Feb 2023
|
|
|
The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023
|
|
|
Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023
|
|
|
Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022
|
|
|
Password Security Guidelines
sponsored by TechTarget
RESOURCE:
In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019
|
|
|
Webinar - Securing IAM: The New Cloud Perimeter is Broken
sponsored by Palo Alto Networks
WEBCAST:
It’s no secret that the cloud is vulnerable, but professionals must become aware of just how vulnerable the cloud can be. In this webinar, learn how one simple misconfiguration in identity and access management allowed researchers to compromise a massively-scaled cloud environment and bypass just about every security control.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021
|
|
|
Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER:
Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021
|
|
|
Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Jan 2021
|
|
|
Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2021
|
|
|
5 steps to secure home devices & improve productivity for remote work
sponsored by Barracuda
WHITE PAPER:
Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 08 Feb 2021 | Published: 21 Dec 2020
|
|
|
Barracuda CloudGen Access
sponsored by Barracuda
DATA SHEET:
Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.
Posted: 08 Feb 2021 | Published: 22 Dec 2020
|
|
|
Five Pillars of an actionable Cloud Security Framework in Azure
sponsored by Barracuda
WHITE PAPER:
In order to ensure a responsible cloud migration, organizations need to ensure that they secure the network, applications and data that will reside in their cloud environment. This white paper takes the widely used NIST Cybersecurity Framework and turns it into 5 actionable pillars. Read on to get started.
Posted: 08 Feb 2021 | Published: 16 Jun 2020
|
|
|
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020
|
|
|
Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER:
The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 08 Feb 2021 | Published: 25 Mar 2020
|
|
|
Enable and Secure Remote Work During the COVID-19 Pandemic
sponsored by Barracuda
PRODUCT OVERVIEW:
The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.
Posted: 08 Feb 2021 | Published: 06 Apr 2020
|
|
|
Getting Customer IAM Right
sponsored by Ping Identity Corporation
WHITE PAPER:
For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.
Posted: 08 Feb 2021 | Published: 03 Apr 2020
|
|
|
Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Oct 2019
|
|
|
A Computer Weekly e-Guide to IAM
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 29 Dec 2020 | Published: 10 Dec 2020
|
|
|
A Computer Weekly e-Guide to IAM
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 01 Jul 2021 | Published: 01 Jul 2021
|
|
|
How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE:
Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020
|
|
|
5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE:
Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020
|
|
|
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020
|
|
|
What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE:
SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020
|
|