IT Management  >   Systems Operations  >   Security  >  

Administration (Security)

RSS Feed   
Administration (Security) Reports
 
Providing Comprehensive Access Control & Data Security in Multi-Cloud Environments
sponsored by Okta + Netspoke
DATA SHEET: Today’s modern, flexible workforce requires a security strategy that is equally agile. For most organizations, identity management and access control is the answer. In this data sheet, take a closer look at a specific offering from Okta & Netskope, designed to meet security and productivity needs across multi-cloud environments.
Posted: 19 May 2020 | Published: 19 May 2020

Okta + Netspoke

Magic Quadrant for Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: Like most security tools, identity governance and administration (IGA) is under pressure to provide cloud-based services to meet customer need. In this Magic Quadrant report, Gartner evaluates key IGA offerings in today’s market to help you determine the right vendor for your needs. Read on to unlock the full report.
Posted: 19 Mar 2020 | Published: 09 Oct 2019

SailPoint Technologies

Passwordless Authentication: How Giving Up Passwords Can Improve Security
sponsored by Thales
WHITE PAPER: Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Zero Trust Evaluation Guide for the Workforce
sponsored by Duo Security
WHITE PAPER: To meet the scalability and security needs of today’s distributed business environments, organizations are adopting a zero-trust approach to manage access to sensitive data. In this white paper, take a look at the process of establishing secure trusted access from your users and their devices to work applications.
Posted: 04 May 2020 | Published: 04 May 2020

Duo Security

HID DigitalPersona® SSO for Microsoft® Office 365
sponsored by HID Global
PRODUCT OVERVIEW: Today’s enterprise leaders are realizing the value of cybersecurity (or rather, the cost of a data breach). To meet the demands of today’s cyberthreats, security leaders are embracing authentication protocols. Read this solution brief to learn more about the challenges of implementing strong authentication, and how to overcome them.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

HID Global

Zero Trust’s Blind Spot: How Proactive Cyber Hygiene Preserves Zero Trust
sponsored by Automox
WHITE PAPER: Although zero-trust has grown in popularity, it should only serve as a piece of the cybersecurity puzzle rather than a standalone solution. In this white paper, discover why organizations should look to make widespread security improvements in order to fill in the gaps of zero-trust and get the most out of their security tools.
Posted: 14 Apr 2020 | Published: 14 Apr 2020


How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

Secure Access to On-prem Apps & Hybrid Cloud Security
sponsored by Okta
DATA SHEET: In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Okta

The Latest Trends in Advanced Authentication Solutions
sponsored by HID Global
WHITE PAPER: It’s estimated that the cost of breaches, identity theft and other cybercrimes will reach $6 trillion by 2021, doubling their cost from 2015. In order to combat these threats, organizations are embracing identity and access management (IAM) to protect sensitive data. Read on to learn more about the latest IAM threats and trends.
Posted: 27 Apr 2020 | Published: 27 Jan 2020

HID Global
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info