IT Management  >   Systems Operations  >   Security  >  

Administration (Security)

RSS Feed   
Administration (Security) Reports
 
The Future of Security and Compliance Starts Here
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

SailPoint Technologies

SailPoint Identity Hub: Search, Track & Manage Access
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

SASE Series, Part 2: The Security View
sponsored by Hughes Network Systems
WHITE PAPER: A term coined by Gartner, Secure Access Service Edge (SASE) is an approach to network security designed to be the successor to data centers as organizations shift their data and endpoints to the cloud. In this blog post, dive deeper into the SASE approach, the growing attack surface, and its relationship with zero trust.
Posted: 07 May 2020 | Published: 30 Apr 2020

Hughes Network Systems

A Guide to Verifying Users in Financial Services
sponsored by Vonage
WHITE PAPER: Learn how banks and fintech companies can securely onboard customers at global scale with phone verification.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Vonage

Predictive Identity: A Key Enabler for a Successful Merger or Acquisition
sponsored by SailPoint Technologies
EBOOK: This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

Single Sign-On Without the Complexity
sponsored by Citrix
EBOOK: An improperly managed SSO forces organizations to implement several access solutions from different vendors to cover their application landscape. In doing so, any productivity and user experience benefits are wiped out, zero trust becomes more difficult and costs go up. Take control of security – read this e-book on Citrix Workspace SSO.
Posted: 28 Sep 2020 | Published: 20 Aug 2020

Citrix

Why it's Critical to Improve your Password Policies in the age of GDPR
sponsored by TechTarget
RESOURCE: Now that we are living in the era of GDPR, it's critical more than ever to have a strong password policy in place to minimize the chances of a data breach announcement. In our expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in
Posted: 19 Jun 2020 | Published: 19 Jun 2020

TechTarget

Solution Brief: Best Practices for Secure Mobile Access
sponsored by SonicWall
PRODUCT OVERVIEW: As organizations shift towards digital workspaces, ensuring the protection of mobile devices becomes increasingly critical. The following solution brief provides a comprehensive set of best practices and practical steps to ensure your organization protects its mobile devices against modern threats.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

Zero Trust: Adopting, Building and Managing your Strategy
sponsored by TechTarget
RESOURCE: Today's security landscape is more hostile than ever before. Threats are evolving at an unprecedented rate, and it's up to security professionals to face the challenge. The Complete Zero Trust Handbook offers guidance into what is the most effective defense against modern threats. Complete our survey to secure your free copy.
Posted: 11 Aug 2020 | Published: 10 Sep 2020

TechTarget

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in an offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info