IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization, and Accounting

RSS Feed   
Authentication, Authorization, and Accounting Reports
 
4 Actions IT Can Take to Ensure Business Continuity Using PKI Automation
sponsored by Sectigo
EBOOK: Managing risks has never been a greater challenge for IT professionals, and this is especially true when considering identity management. With an increasing number of angles for bad actors to steal passwords, it may be time for an evolution in authentication. Jump into this e-book to learn about public key infrastructure.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

Socure ID + Intelligent KYC
sponsored by Socure
DATA SHEET: Socure ID + KYC – also known as ‘Intelligent KYC’, is highly regarded for enabling organizations to unlock massive scale in auto-acceptance and enrollment rates. But how does it stack up against the competition? Read this data sheet to find out.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Socure

Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER: Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020

Cysiv

GARANCY Password Management
sponsored by Beta Systems
PRODUCT OVERVIEW: Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Designing Security For Remote-Work-First Enterprises
sponsored by Palo Alto Networks
RESEARCH CONTENT: As a result of the spread of COVID-19, Gartner observed a stark increase in inquiries related to remote access (over 400%), and a recent survey revealed that 41% of employees are going to be working remote post-pandemic. Read this report to discover Gartner’s 3 step process for building cybersecurity for remote workforces.
Posted: 08 Jan 2021 | Published: 30 Jun 2020

Palo Alto Networks

Okta + Netskope + CrowdStrike + Proofpoint: Securely Enable Remote Work at Scale
sponsored by Okta
DATA SHEET: Security and access challenges have been magnified by the massive global shift towards remote work. Read this data sheet to see how Okta, Netskope, Crowdstrike and Proofpoint (also known as the Spectra Alliance) combine their efforts to enable organizations to securely enable remote work at scale.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Would You Bet Your Business On the Strength of Every Employee’s Password?
sponsored by Panda Security
EBOOK: Password misuse and reuse present way too big a risk for password ‘use’ in general. Plus, passwords are not hard to obtain if you have the right hacking skill set – and they’re sought after, running for about $160 apiece on the dark web. If you’re searching for an alternative to passwords, check out this e-book on two-factor authentication.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info