IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed   
Enterprise Single Sign-on Reports
 
Threat Intelligence
sponsored by Infoblox
PRODUCT OVERVIEW: Security organizations are under tremendous pressure to protect their infrastructure from cyberthreats. Threat intelligence can help organizations respond to these threats, however many organizations lack the visibility required to prioritize threats. In this resource, learn how BloxOne Threat Defense can help organizations protect their networks.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

Infoblox

Stopping Email Fraud
sponsored by Proofpoint
WHITE PAPER: Email fraud has cost victims more than $12.5 billion between the end of 2013 and 2018, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 21 Jun 2019 | Published: 31 Jan 2018

Proofpoint

20 Docker and Container Experts to Follow Online
sponsored by New Relic
JOURNAL ARTICLE: Any business interested in container implementation will need to self-educate for a smooth adoption process. View this article to learn and connect with 20 containers experts that will be sure to help your container initiative.
Posted: 20 Jun 2019 | Published: 08 Jun 2018

New Relic

The Changing Role of the IT Manager
sponsored by ProAct
WHITE PAPER: Striking a balance between IT in its traditional support function and IT as a value-adding entity is no easy feat. Keep reading to find out nine key recommendations for IT managers on how to continuously develop their careers and keep in tune with current and upcoming shifts in the industry.
Posted: 21 Jun 2019 | Published: 15 Aug 2018

ProAct

Security and Governance for Amazon S3 Data Lakes
sponsored by Okera
WHITE PAPER: In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.
Posted: 24 Jun 2019 | Published: 31 Mar 2019

Okera

Podcast: Privileged Account Governance and Incident Response
sponsored by One Identity
PODCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

Webcast: Solutions for Privileged Account Resilience
sponsored by One Identity
WEBCAST: Tune into this informative webcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

Securing Web Apps From the Inside Out
sponsored by Arxan
EBOOK: Arxan for Web can protect client-side code and prevent reverse engineering. It also delivers realtime threat reporting and analytics. Download this e-book to learn more about Arxan for Web today.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Arxan

Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process
sponsored by FairWarning
WHITE PAPER: Cloud solutions can reduce costs, but storing information in the cloud can present security risks. This doesn't mean organizations shouldn't use the cloud; however they should amp up their security to protect their data. This white paper will help you decide whether to build or buy cloud security software by determining your top priorities.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

FairWarning

Breach and Attack Simulation Made Simple
sponsored by Cymulate
PRODUCT LITERATURE: Download this white paper to learn about Cymulate's SaaS-based Breach and Attack Simulation (BAS) platform. It tests both internal and external system defenses and shows exactly where you're exposed and how to fix it quickly.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Cymulate
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement