IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

Enterprise Single Sign-on

RSS Feed   
Enterprise Single Sign-on Reports
 
Extreme AI Security
sponsored by Extreme Networks
PRODUCT OVERVIEW: In this brief, learn how ExtremeAI Security can help to defend against cyberattacks by delivering an innovative, AI-powered solution for IoT device security coupled with automated threat remediation and containment.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Extreme Networks

Next-Gen Deception Technology: Moving Beyond Honeypots
sponsored by Illusive Networks
WHITE PAPER: As the market has evolved, three general types of deceptions have emerged; full interaction decoys (honeypots), partial or low interaction emulated decoys, and endpoint data deceptions. In this white paper, explore each type of deception and review the increasing complexity of deception technology.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Illusive Networks

Newcomer Banyan Tackles Zero Trust with a Mesh-Based Approach to Multi-Cloud Security
sponsored by Banyan Security
ANALYST REPORT: In this 451 Research report, learn about Banyan’s new security offering that focuses on the authorization layer of a zero-trust platform, or what it calls a ‘zero trust continuous authorization framework.’
Posted: 03 Dec 2019 | Published: 03 Dec 2019

Banyan Security

Passwordless Datasheet
sponsored by Okta
DATA SHEET: Identity-driven attacks are increasingly common methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud. Read this data sheet to discover how passwordless authentication can help keep attackers at bay without locking out good users.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Is Noise Pollution Making Your Data Less Secure?
sponsored by F5 Networks
WHITE PAPER: Automated attacks are increasing in frequency and sophistication, with about 77% of web attacks starting from botnets. With the increasing volume of cyberattacks, it’s critical for organizations to ensure accurate logs. Continue to this article to uncover the importance of logging and how F5’s Advanced WAF service can help.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks

Who should get the technology vote in the UK General Election?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.
Posted: 09 Dec 2019 | Published: 10 Dec 2019

ComputerWeekly.com

Preventing PeopleSoft Breaches
sponsored by Appsian
WHITE PAPER: Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Appsian

Taking Steps to Protect Financial Mobile Applications
sponsored by Intertrust
WHITE PAPER: Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Take Care When Fighting Mobile Commerce Fraud
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: Can you strengthen your defense without making a mess of customer experience? As cybercriminals are getting more sophisticated with their attacks, retailers of all sizes are asking themselves this question. In this white paper, explore what to consider when refining your mobile security strategy.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

LexisNexis® Risk Solutions

Bringing it all Together: Okta, HR and Your Directories
sponsored by Okta
RESOURCE: For IT and HR, managing access to multiple applications for employees can be challenging. In this infographic, learn how IAM and user lifecycle management can make it easier to manage systems by automation the onboarding and offboarding of key apps and resources for every employee.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement