IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization, and Accounting

RSS Feed   
Authentication, Authorization, and Accounting Reports
 
Cradlepoint NetCloud Work From Anywhere Solution vs. Consumer Grade Hotspots
sponsored by CradlePoint
DATA SHEET: Is your organization looking for a way to easily manage all of your devices at scale through the cloud, from anywhere? Is it important that you deploy consistent security policies to all of your routers? View this data sheet for an in-depth look at a solution that includes wireless routers with enterprise-class reliability, security and management.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

CradlePoint

Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

Continuous Authentication as the Zero Trust Multiplier
sponsored by BlackBerry
RESOURCE: The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.
Posted: 10 Jul 2020 | Published: 14 May 2020

BlackBerry

Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters
sponsored by Tehama
WHITE PAPER: Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.
Posted: 27 Aug 2020 | Published: 29 Feb 2020

Tehama

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

SailPoint Identity Hub: Search, Track & Manage Access
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Selecting the Right Ink Technology for ID Card Printing — What You Need to Know
sponsored by HID Global
WHITE PAPER: Selecting the right ink technology for ID badges and card printing can have a profound impact on the overall efficacy and durability of your card printing solution. This white paper explores the differences in today’s leading card printing technologies – highlighting the carious printing, dying and lamination methods. Read on to get started.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

HID Global

2019 Report for Identity Governance & Administration
sponsored by IBM
RESOURCE: For the fifth consecutive year, Gartner has named IBM a Leader in the Magic Quadrant for Identity Governance & Administration (IGA). With IBM, clients have access to the broadest set of IGA capabilities on their journey to the cloud.
Posted: 07 Aug 2020 | Published: 09 Oct 2019

IBM

Key Tenets of Zero Trust Architecture
sponsored by ColorTokens
RESOURCE: Zero-trust architecture (ZTA) is a security blueprint built on the premise that attackers are already present and that anything can be compromised at any point. Broadly speaking, the tenets of ZTA can be classified under three security domains. Read this short article alongside the NIST SP 800-207 to examine the vital roles of these tenets.
Posted: 30 Sep 2020 | Published: 04 Sep 2020

ColorTokens
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info