Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed   
ID Management Reports
 
The great IAM - time to modernise?
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 05 Apr 2019 | Published: 05 Apr 2019

ComputerWeekly.com

Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI
sponsored by Thales
WHITE PAPER: In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.
Posted: 23 Apr 2020 | Published: 07 Apr 2020

Thales

Identity as a Service for Dummies
sponsored by Okta
EGUIDE: According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Service Account Security for Dummies
sponsored by Thycotic
EBOOK: Nearly every organization faces significant security threats due to unmanaged, uncontrolled privileged service accounts, which hackers are happy to exploit. Download your copy of Service Account Security for Dummies to better understand and manage their service accounts and reduce the risk of accounts being compromised and abused.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

Thycotic

BlackBerry AI Powered Zero Trust
sponsored by BlackBerry
WEBCAST: Endpoint security affects all aspects of an organization, not least when workforces are remote.To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner?This webcast presents models that organizations can use.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

BlackBerry

Zero Trust’s Blind Spot: How Proactive Cyber Hygiene Preserves Zero Trust
sponsored by Automox
WHITE PAPER: Although zero-trust has grown in popularity, it should only serve as a piece of the cybersecurity puzzle rather than a standalone solution. In this white paper, discover why organizations should look to make widespread security improvements in order to fill in the gaps of zero-trust and get the most out of their security tools.
Posted: 14 Apr 2020 | Published: 14 Apr 2020


Digital identities and the open business
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

ComputerWeekly.com

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info