IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization Codes

RSS Feed   
Authorization Codes Reports
 
Take a Better TAC to Protect RDP
sponsored by PortSys
RESOURCE: Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Balancing Fraud Detection and the Customer Experience
sponsored by SAS
WHITE PAPER: Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.
Posted: 07 Aug 2019 | Published: 31 Mar 2019

SAS

Five Steps To A Zero Trust Network
sponsored by Optiv
ANALYST REPORT: This Forrester report gives security and risk leaders best practices and a 5-step road map to realize the benefits of a Zero Trust strategy more quickly. Read on to learn more.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Optiv

Zero Trust Access Today's IT Security Falls Short
sponsored by PortSys
RESOURCE: 78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

PortSys

A Guide To Fraud In The Real World
sponsored by Splunk
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

Leading the Way With Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: According to the 2018 Verizon Data Breach Report, the hospitality industry is one of the top five industries subjected to network breaches every year. Learn how OpenKey, a company leading the way with secure mobile keyless hotel access, was able to securely host their customer data with a private cloud provider.
Posted: 07 May 2019 | Published: 07 May 2019

Armor

Key Considerations for a Successful Zero Trust Security Strategy Webinar
sponsored by Aporeto
WEBCAST: Tune into this 60 minute webinar to hear Trace3 and Aporeto discuss the Zero-Trust security framework components and what to consider for a successful cloud security strategy.
Posted: 09 Oct 2019 | Premiered: Oct 9, 2019

Aporeto

Discover your Single Sign-On (SSO) and Multi-factor Authentication Security Options
sponsored by TeamViewer
RESOURCE: In this blog post, learn how an identity management platform can help save time for employees, as well as help them understand the importance of creating strong passwords and two-factor authentication.
Posted: 24 Apr 2019 | Published: 24 Apr 2019

TeamViewer

Avoid Authentication Anarchy: How to Choose your Authenticator
sponsored by HID Global
WHITE PAPER: Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

HID Global

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement