IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization and Accounting

RSS Feed   
Authentication, Authorization and Accounting Reports
 
Security Controls for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.
Posted: 23 Jan 2020 | Published: 30 Sep 2017

ShieldX

Understanding Zero Trust Security
sponsored by Atlassian
WHITE PAPER: Inside this white paper, find the current state of workplace security, the basic principles of the Zero-Trust security model, and how you can begin your journey towards a Zero Trust-secure workplace environment.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Atlassian

CyberArk Blueprint for Privileged Access Management Success
sponsored by Cyber-Ark Software
WHITE PAPER: In today’s threat landscape, external attackers and malicious insiders routinely exploit privileged accounts to steal sensitive data or cause operational disruptions. To address this, IT security leaders need to rethink their privileged access management (PAM) strategy. Read on to discover a blueprint for PAM success.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

Passwordless Authentication with Okta
sponsored by Okta
VIDEO: In this demo video, learn how to setup Passwordless Authentication with Okta for your organization using adaptive policies.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

Okta

SafeNet Trusted Access: Cloud-based Access Management as a Service
sponsored by Thales
PRODUCT OVERVIEW: While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.
Posted: 27 Mar 2020 | Published: 31 May 2019

Thales

Digital Identity Proofing How to Verify Identities Remotely and Securely
sponsored by Entrust, Inc.
WHITE PAPER: In response to the recent surge of remote workers and online shoppers, organizations are having to take measures to ensure their environments are fit to secure the growing volume of users while maintaining experience. Read this white paper to learn more about an effective and scalable approach – identity proofing.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Entrust, Inc.

Consumer Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Consumer authentication services enable online retailers and eCommerce organizations to shift away from passwords, which continue to pose a security risk. This report highlights some of the key players and offerings in the consumer authentication market, as well as a guide for choosing the right vendor. Read on to learn more.
Posted: 02 Apr 2020 | Published: 26 Sep 2019

Ping Identity Corporation

Guide to Zero Trust for Federal Agencies
sponsored by Gigamon
WHITE PAPER: Cyberattacks targeting federal agencies are growing in both volume and complexity, and existing tactics are unable to protect these networks. To meet rising threats, security leaders are adopting a zero-trust model, a concept that states that users, devices and apps can’t be trusted without authentication. Read on to learn more.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Gigamon

Credential stuffing attacks: What they are and how to combat them
sponsored by Auth0
WHITE PAPER: Credential stuffing attacks are one of the most common types of large-scale cyberattacks today. In fact, 29% of data breaches in 2019 involved the use of stolen credentials. So how can you combat them? Download this white paper for everything you need to know.
Posted: 20 May 2020 | Published: 20 May 2020

Auth0

Zero Trust Secure Access
sponsored by Pulse Secure
ANALYST REPORT: Our dynamic world of mobile and cloud computing requires advancing secure access capabilities based on continuous verification and authorization. In this Expert Focus e-zine, learn why and how to apply a zero-trust model for hybrid IT access and how software-defined perimeter adoption will expand in the years ahead.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Pulse Secure
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info