IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization, and Accounting

RSS Feed   
Authentication, Authorization, and Accounting Reports
 
Nine Best Practices for Active Directory Security
sponsored by Quest
WHITE PAPER: It is often assumed that threats come from outside an organization. However, a lapse in internal security is often what enabled an attack to succeed. In this white paper, explore how a typical insider threat unfolds. The white paper also details 9 critical security best practices that minimize the risk of an internal threat.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

Quest

Multi-Factor Authentication (MFA): Is this the Security Solution You Need?
sponsored by OneLogin
WHITE PAPER: Users want a simple user experience to complement the way they work. IT wants an adequate level of risk mitigation for the organization. Implementation of adaptive Multi-Factor Authentication (MFA) can balance these two factors. Read on to learn more.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

The Essentials: Privileged Access Management
sponsored by HelpSystems
WHITE PAPER: Find out how you can effectively control and protect privileged UNIX and Linux accounts using centralized access management.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

The Five Most Creative Ways that Organizations are Using Advanced Authentication
sponsored by Micro Focus
VIDEO: In this webinar, hear from identity and access management experts, Kent Purdy and Troy Drewry, about the new ways organizations are using the latest authentication technologies and how they're preparing the future.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Micro Focus

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Take Control of Virtual Desktop Access with Two-Factor Authentication
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Citrix

Speed Up Your Business with E-Signatures
sponsored by Adobe EchoSign
WHITE PAPER: This white paper shows how IT departments can implement an e-signature solution that will cut down physical paperwork and increase efficiency.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Getting Started with Cloud IAM Services
sponsored by OneLogin
EGUIDE: In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
Posted: 24 Jul 2017 | Published: 19 Jul 2017

OneLogin

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement