IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization, and Accounting

RSS Feed   
Authentication, Authorization, and Accounting Reports
 
Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: This infographic highlights some of the key takeaways from the 2019 Thales Access Management Index. Continue reading to uncover the key takeaways as they relate to top access management tools, the role of data breaches in access management adoption & other significant statistics.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Thales

Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY: Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

Can Zero Trust Fix What’s Wrong with IT Security?
sponsored by PortSys
RESOURCE: Why is zero trust such a prominent discussion both in the board room and among IT security professionals? Read this article for a look at how zero trust access changes the IT security game today.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

Consumer Data Right: Open Banking
sponsored by Ping Identity Corporation
DATA SHEET: With consumers growing increasingly reliant on digital services and interfaces, the financial industry is evolving to meet these expectations through open banking interfaces. In this solution brief, explore the Ping Identity Platform, designed to meet Australia’s Open Banking requirements while still providing a seamless user experience.
Posted: 15 Nov 2019 | Published: 16 Aug 2019

Ping Identity Corporation

Protecting Privileged Access Is Critical to the Protection of a Company’s Crown Jewels
sponsored by CyberArk Software, Inc
WHITE PAPER: In this infographic from Privileged Access Security for Dummies, discover some tips & best practices when it comes to protecting your company’s data. Learn how to: Secure critical information, reduce cyberattack risk, and take preventative security action.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

CyberArk Software, Inc

Transparency, Efficiency, and a Modern Employee Experience in the Month-End Close Process
sponsored by ServiceNow
CASE STUDY: In this case study, learn how ServiceNow's Finance Close Automation application can make your month-end close more manageable. Review how ServiceNow's Finance Close Automation application can help your accounting team achieve greater efficiency and productivity, and decide if Finance Close Automation is right for your organization.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

ServiceNow

How to Achieve Zero-Trust Nirvana
sponsored by TechTarget
RESOURCE: In the e-guide, find out how to implement a zero-trust model, the two key concepts required by security and ops' teams to get the job done, why a microsegmentation security strategy is the key to zero trust, and much more.
Posted: 13 Jul 2019 | Published: 02 Nov 2019

TechTarget

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In
sponsored by LexisNexis® Risk Solutions
RESOURCE: The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

OneLogin
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement