IT Management  >   Systems Operations  >   Security  >   AAA  >  

Carrier Identification Codes

RSS Feed   
Carrier Identification Codes Reports
 
The Evolution of Zero Trust
sponsored by Banyan Security
WHITE PAPER: As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.
Posted: 03 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Cisco Umbrella & Duo Security: Protect users and secure access to applications
sponsored by Cisco Umbrella
DATA SHEET: As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Cisco Umbrella

The 2019 Zero Trust Privilege Maturity Model Report
sponsored by Centrify Corporation
ANALYST REPORT: To provide context around the current state of Zero Trust Privilege, Centrify surveyed 1,300 information security professionals. Download this 2019 report to learn more about the Zero Trust Privilege Maturity Model and discover key findings from the survey.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

Zero Trust Access Today's IT Security Falls Short
sponsored by PortSys
RESOURCE: 78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

PortSys

Zero Trust Remote Access Platform
sponsored by Banyan Security
PRODUCT OVERVIEW: Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.
Posted: 05 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Single Sign-On with TeamViewer Tensor
sponsored by TeamViewer
RESOURCE: Enterprise remote access can enable your team to work from anywhere on any device, but can also make you more vulnerable to attackers. Learn about a cloud-based remote access management platform that has built-in security features like SSO to help keep you safe from attackers while maximizing productivity in this infographic.
Posted: 30 May 2019 | Published: 30 May 2019

TeamViewer

How to Guide: Zero Trust Security Transformation
sponsored by Akamai Technologies
WHITE PAPER: The notion of a network perimeter can't be relied on in today's business landscape. A strategic security framework is needed. Download this guide to zero trust security for an understanding of what it is and why it's important for organizations to implement today.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Akamai Technologies

Managing Customer & Partner Identities
sponsored by Okta
WHITE PAPER: As a business, the last thing you want to do is make it difficult for users to log in by challenging them with cumbersome authentication processes. IT leaders are transitioning from on-prem identity management solutions to cloud-based identity as a service (IDaaS). Read this white paper to uncover the key functions and benefits of IDaaS.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Insider Security Threats: What CISOs Can Do to Mitigate Them
sponsored by Preempt Security
EGUIDE: Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

Preempt Security

Getting Started with Cloud IAM Services
sponsored by OneLogin
EGUIDE: In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
Posted: 24 Jul 2017 | Published: 19 Jul 2017

OneLogin
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info