IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization and Accounting

RSS Feed   
Authentication, Authorization and Accounting Reports
 
Passwordless Datasheet
sponsored by Okta
DATA SHEET: Identity-driven attacks are increasingly common methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud. Read this data sheet to discover how passwordless authentication can help keep attackers at bay without locking out good users.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Okta Identity Management for Portals Built on Salesforce.com
sponsored by Okta
WHITE PAPER: Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

HID ActivOne User Friendly Strong Authentication
sponsored by HID Global
WHITE PAPER: As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.
Posted: 11 Apr 2019 | Published: 02 Nov 2018

HID Global

The Evolution and Application of Identity Proofing
sponsored by Evident
WHITE PAPER: Technology advancements have changed the landscape of identity proofing, challenging organizations to digitally verify that an individual is who they say they are online. But many businesses are resultant to implement identity proofing. In this white paper, learn why identity proofing is key to avoid risks associated with identity theft.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Evident

Important Things You Need to Know about Storing Your Identity
sponsored by RSA Conference
VIDEO: Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.
Posted: 31 Jul 2019 | Premiered: 16 May 2019

RSA Conference

Preventing PeopleSoft Breaches
sponsored by Appsian
WHITE PAPER: Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Appsian

Getting Started with Zero Trust Never trust, Always Verify
sponsored by Okta
WHITE PAPER: There is no silver bullet when it comes to achieving a zero-trust security architecture, but identity and access management is the core technology that organizations can start with on their Zero Trust journeys. Read on to learn the benefits of Zero Trust and what a framework looks like today.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Okta

7 Considerations for Implementing Zero Trust
sponsored by Banyan Security
RESOURCE: Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Banyan Security

Top 5 Reasons to Automate Identity Lifecycle
sponsored by Okta
WHITE PAPER: As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Securing the Grid Why Privileged Access Security is Key to Protecting Critical Energy & Utilities Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: One of the largest security vulnerabilities faced by companies in the energy and utilities sector is privileged accounts, and the access they provide. In this white paper, learn how energy and utilities organizations can proactively reduce the risk posed by privileged access.
Posted: 10 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement