IT Management  >   Systems Operations  >   Security  >   AAA  >  

Carrier Identification Codes

RSS Feed   
Carrier Identification Codes Reports
 
4 Companies Seek Password Security Management
sponsored by Fast Pass Corp
CASE STUDY: Explore this case study to learn about how 4 companies implemented a password management strategy to improve their overall password security. Through this case study, uncover core benefits the companies experienced.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Fast Pass Corp

Access Control is Easy
sponsored by One Identity
WHITE PAPER: Effective access control is a matter of well-managed groups. This resource uncovers how to implement and manage Active Directory (AD) groups and dives into why they are at the center of the access control and governance universe.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Overcome the Top 5 Cloud Migration Obstacles with IAM
sponsored by Identity Automation
EBOOK: According to an IDG survey, 45% of organizations have already moved their applications and computing infrastructure to the cloud. Explore this resource to gain insight into why IAM should be the focal point of your cloud migration strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

How to Maintain Control of Documents and Files Shared with Others
sponsored by Citrix
VIDEO: Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018

Citrix

IAM for the Real World: Privileged Account Management
sponsored by One Identity
EBOOK: The world of IAM is one of constant change, shrinking deadlines and harsh regulations. This e-book dives into the most pressing IAM issues faced by organizations and offers actionable, affordable and sustainable approaches to combatting these challenges.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement