IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
Bridging the Gap Between Active Directory and the Cloud
sponsored by Okta
WHITE PAPER: In this white paper, learn how you can integrate your legacy AD environment with modern SSO from Okta and the Okta Identity Cloud.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Okta

Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations
sponsored by Okta
WEBCAST: For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.
Posted: 27 Mar 2020 | Premiered: Jul 31, 2018

Okta

Cyber Confidence: Building a Trustworthy Security Posture
sponsored by Nominet
WHITE PAPER: As cyberattacks continue to grow more costly and disruptive, IT security teams are put under an increasing amount of pressure to address these challenges. To better understand the security landscape, Nominet conducted a study designed to answer key questions related to cyber confidence and threat management. Read on to unlock the results.
Posted: 01 Apr 2020 | Published: 01 Apr 2020


Augmenting Security with Always-On
sponsored by Radware
ANALYST REPORT: The impact of a DDoS attack is massive. Web Services remain unavailable due to volumetric attacks and enterprises incur hefty losses that run into millions. In this Frost & Sullivan report, learn why a hybrid always-on deployment model is the ideal solution to combat sophisticated DDoS attacks.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

The Top 7 Phone Verification Challenges & How to Overcome Them
sponsored by Vonage
WHITE PAPER: No consumer wants to be the victim of fraud or the recipient of unwelcome spam, and no app or service provider wants to unwittingly harbor spammers or fraudsters. In this e-book, learn how to increase conversion rates and onboard users at global scale with phone verification.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Vonage

Enabling Your Enterprise with Fast, Agile, Customer IAM In the Cloud
sponsored by Ping Identity Corporation
WEBCAST: One vector that hackers are eager to expose is sensitive data associated with customer-facing apps and interfaces. The same way that employee IAM enables organizations to control and manage access, customer IAM (CIAM) provides a secure and seamless user experience. Watch this webinar to discover the benefits of incorporating CIAM.
Posted: 30 Mar 2020 | Premiered: May 31, 2019

Ping Identity Corporation

Customer Identity & Access Management (CIAM)
sponsored by Ping Identity Corporation
WHITE PAPER: Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Ping Identity Corporation

Building Cloud Services for Security: 3 Common Misconfigurations
sponsored by DivvyCloud
WHITE PAPER: Ensuring the secure configuration of a distributed set of cloud services is a critical piece to cloud transformation. In fact, most risk areas related to cloud come from security misconfigurations. This white paper highlights 3 common misconfigurations and explores ways to fix them or prevent them from happening.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

The 4 Levels of Automated Remediation
sponsored by Egress Software Technologies Inc
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Egress Software Technologies Inc

The Comprehensive 1-minute IT Audit
sponsored by TechData - Microsoft
VIDEO: In this short and comical video, learn about Microsoft 365 Business Premium and how it can help SMB security needs.
Posted: 03 Apr 2020 | Premiered: 03 Apr 2020

TechData - Microsoft
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info