Standards  >   Network Protocols  >   Network Authentication Protocols  >  

CHAP

RSS Feed   
CHAP Reports
 
Microsoft Office 365 Security, SASE, and Zero Trust
sponsored by InteliSecure
EBOOK: Along with the latest security innovation from Microsoft - Office 365 Security - businesses are considering a SASE platform and zero trust architecture to further push their networks to the edge of security. With these developments, IT professionals are asking, ‘Why is this better than what we have in place?’ View this e-book to learn the answer.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

InteliSecure

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Maintaining Business Momentum In The Face Of Forced Change: The Active Directory Angle
sponsored by Quest
WHITE PAPER: With the frantic pace of today’s business world, organizations struggle to keep up with requests to create, change and remove access to their on-premises AD. This scenario becomes even more complicated when you mix in a hybrid AD environment. Read this white paper to learn why properly-tuned AD lifecycle management is crucial for handling change.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Quest

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: In the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Your Guide to Using NGINX
sponsored by NGINX
EBOOK: Read this eBook to learn about NGINX, open source software that can be used as a web server, load balancer, content cache, API gateway and more. This 175-page book covers everything from how to properly install NGINX, to how to configure all the major features, to debugging and troubleshooting.
Posted: 04 May 2020 | Published: 04 May 2020

NGINX

Here Comes 2021: 5 Safe Bets and 5 Long Shot Predictions
sponsored by Netskope
WHITE PAPER: Quite often, things don’t go as planned (as least as far as the big events in life go). For networking and security professionals, this was true of plans made in 2019 for 2020. All of 2019’s plans went out the window early on, and organizations had to adjust. So, what are experts saying about 2021? Download this article to find out.
Posted: 11 Jan 2021 | Published: 24 Nov 2020

Netskope

Unpacking Research on Employee Security Awareness
sponsored by Mimecast
WEBCAST: The numbers are in: Information alone does not change people’s minds. Organizations will attempt to mold their employees into security encyclopedias, but without proper behavioral analysis, no amount of training will do what is desired.Immerse yourself in this webcast, which unpacks Forrester research and gets to the bottom of security awareness.
Posted: 21 Jul 2020 | Premiered: Jul 21, 2020

Mimecast

Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info