IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

IAM

RSS Feed   
IAM Reports
 
Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security
sponsored by Atakama
RESOURCE: The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020

Atakama

Top 5 Reasons To Put Privilege First
sponsored by CyberArk Software, Inc
EBOOK: There’s single solution available in the market today that will prevent every advanced cyberattack. So, organizations must protect their identities and prioritize what matters most first – privileged access. Open this e-book for 5 reasons why.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Access Control
CyberArk Software, Inc

Buyer's Guide For Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
EBOOK: This PAM Checklist is a thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. It will help you identify where to begin your privileged access management project, how to progress to a better IT security posture, and what business outcomes to expect.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

BeyondTrust Corporation

Report, Zero Trust: What You Need to Know to Secure Your Data and Networks
sponsored by Gigamon
ANALYST REPORT: Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it’s time to rethink strategy. As Gigamon’s new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security.
Posted: 15 Sep 2020 | Published: 31 Mar 2020

Gigamon

A Computer Weekly e-Guide to IAM
sponsored by ComputerWeekly.com
EGUIDE: We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 29 Dec 2020 | Published: 10 Dec 2020

ComputerWeekly.com

Webinar - Securing IAM: The New Cloud Perimeter is Broken
sponsored by Palo Alto Networks
WEBCAST: It’s no secret that the cloud is vulnerable, but professionals must become aware of just how vulnerable the cloud can be. In this webinar, learn how one simple misconfiguration in identity and access management allowed researchers to compromise a massively-scaled cloud environment and bypass just about every security control.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

Palo Alto Networks

Securing the Workplace of the Future
sponsored by Tehama
EBOOK: By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.
Posted: 24 Aug 2020 | Published: 27 Nov 2019

Tehama

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Remediant Secure One Solutions Brief
sponsored by Remediant
PRODUCT OVERVIEW: In order to address the growing threat of cyberattacks caused by access mismanagement, Remediant created the zero-standing privilege model to help organizations enhance their identity and access management programs. But what is zero-standing privilege & how does it work? Read this solution brief to find out.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

Remediant

Blackberry Cyber Video
sponsored by BlackBerry
VIDEO: According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.
Posted: 30 Dec 2020 | Premiered: 30 Dec 2020

BlackBerry
 
Browse by Report Type:
IAM White Papers | IAM Multimedia | IAM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences