IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization and Accounting

RSS Feed   
Authentication, Authorization and Accounting Reports
 
Controlling and ManagingPrivileged Access
sponsored by One Identity
: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: As infrastructure becomes more permeable to enable new business models, cyber criminals are becoming more sophisticated, and incentivized to find ways to circumvent security measures. Traditional perimeter security weren't designed for today's reality. This white paper describes a security paradigm for today's hostile environment: zero trust.
Posted: 21 Dec 2018 | Published: 28 Feb 2018

Akamai Technologies

Top 5 Ways to Relieve the Pain of Managing Hybrid AD Environments
sponsored by One Identity
: According to One Identity, nearly 90% of organizations worldwide are using Active Directory (AD) for on-premises resources. This e-book addresses 5 challenges that organizations must overcome as they navigate the transition to a hybrid AD implementation.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

The Five Most Creative Ways that Organizations are Using Advanced Authentication
sponsored by Micro Focus
VIDEO: In this webinar, hear from identity and access management experts, Kent Purdy and Troy Drewry, about the new ways organizations are using the latest authentication technologies and how they're preparing the future.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Micro Focus

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Securing content and access with smart management techniques
sponsored by SearchContentManagement
EBOOK: When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

SearchContentManagement

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement