IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization Codes

RSS Feed   
Authorization Codes Reports
 
Police Department Locks Down Remote Access
sponsored by One Identity
CASE STUDY: Explore this case study to gain insight into how a police department increased security of mobile computing devices as well as met compliance with federal requirements to provide secure remote access.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

One Identity

How to Minimize the IAM Risks Associated with Third-Party Relationships
sponsored by Identity Automation
EBOOK: With 63% of breaches resulting from weak, default, or stolen passwords, it's clear that single-factor authentication isn't enough to secure data. Locking down third-party accounts with privileged access management is more urgent than ever. Discover a variety of ways to increase your IAM approach to mitigate the risks of third-party relationships.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Identity Automation

7 Tough Questions to Ask Before Switching Certification Authorities
sponsored by Entrust, Inc.
WHITE PAPER: A certification authority is responsible for the issuance and management platform of digital certificates, which secure internal servers, web applications, emails and more. This resource offers 7 tough questions to ask before switching certification authorities.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Entrust, Inc.

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

Identity and Access Management for the Real World: The Fundamentals
sponsored by One Identity
EBOOK: The world of IAM is one of constant change, deadlines, and harsh regulations. This e-book delves into the most pressing IAM issues faced by organizations and offers actionable, affordable and sustainable approaches to these challenges.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

How to Maintain Control of Documents and Files Shared with Others
sponsored by Citrix
VIDEO: Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018

Citrix

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017


Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Thycotic

Insider Security Threats: What CISOs Can Do to Mitigate Them
sponsored by Preempt Security
EGUIDE: Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

Preempt Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement