IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed   
Enterprise Single Sign-on Reports
 
Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi Vantara
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi Vantara

Phishing Attacks Advanced Techniques That Evade Detection
sponsored by Vade Secure
WHITE PAPER: The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Thales Data Protection Portfolio
sponsored by Thales
PRODUCT OVERVIEW: In this solution brief, discover an overview of Thales’ data protection portfolio – a collection of capabilities and offerings designed to enable improved security, compliance and operational efficiency while reducing costs. Read on to learn more about the features and benefits of the portfolio.
Posted: 11 Sep 2020 | Published: 29 Feb 2020

Thales

Essential Security Foundations: Monitoring Basic Security Posture
sponsored by Splunk
WHITE PAPER: Most cybersecurity tools are designed to help identify and alert on a malicious activity. But usually the burden lies with the organization to figure out whether the alert is meaningful in a broader context. In this white paper, learn how you can gain insight into whether your security team needs to investigate these alerts deeper.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Splunk

Ransomware: Paying Hackers Is A Losing Game
sponsored by Veritas
EBOOK: Ransomware: Paying Hackers Is A Losing Game
Posted: 11 Sep 2020 | Published: 11 Sep 2020

TOPICS:  Security
Veritas

Energy Industry Leader Chooses Cisco HyperFlex and Cisco Intersight Over Public Cloud
sponsored by Cisco
CASE STUDY: Check out this case study to learn how implementing a hyperconverged infrastructure has allowed energy industry leader EXMAR’s IT operations to support a continuously changing business through cost efficiency, new computing resources, reduced latency, and more.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

Cisco

Worldwide Mobile Threat Management Software 2020 Vendor Assessment
sponsored by Lookout
ANALYST REPORT: Security leaders pursuing Zero Trust should use MTM to secure all mobile devices – both managed and unmanaged – that employees use to stay productive wherever they work. Learn why IDC named Lookout a Leader in MTM three years in a row.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

Lookout

Journey to the Cloud with Confidence. Security Automated Everywhere.
sponsored by Checkpoint Software Technologies
VIDEO: Security is now in the cloud, and it is growing fast. As a result, it can be difficult to control or be visible of security tasks such as vulnerability management, configuration and compliance. Watch this video to learn about an automated cloud-native security platform that allows you to understand where your cloud resources are in context.
Posted: 10 Sep 2020 | Premiered: 09 Jun 2020

Checkpoint Software Technologies

Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

What is Machine Learning Operations? MLOps Explained
sponsored by BMC
WHITE PAPER: Open this paper to learn more about MLOps, the three crucial components of any MLOps strategy, and the benefits your organization could stand to see from using MLOps now.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

BMC
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info