Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed   
ID Management Reports
 
Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

THE IDENTITY EXPERIENCE HOW IDENTITY CREATES GREAT UX
sponsored by Onfido
RESOURCE: Enterprises strive for great UX, but where many tend to miss the mark is through a lack of identity verification. Adding identity can create benefits such as more efficient onboarding and improved ease of use, which translate into less drop-off and more conversion. To read further, access this guide outlining Onfido’s Identity Verification.
Posted: 08 Mar 2021 | Published: 08 Mar 2021

Onfido

Sase & Ztna
sponsored by VMware
EBOOK: Already, SASE is playing a big role in conversations about how to improve remote security and increase network efficiency. Now, zero-trust network access (ZTNA) can provide a user’s contextual identity to all the different SASE security services, making for a smarter, more secure edge. Download SASE & ZTNA For Dummies to learn more.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

VMware

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE: Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020

Atakama

A Computer Weekly e-Guide to IAM
sponsored by ComputerWeekly.com
EGUIDE: We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Extreme Networks Special Edition Cloud-Managed Network Access Control (NAC)
sponsored by Extreme Networks
EBOOK: Today, an ever-growing number of corporate and guest devices need to be securely onboarded and provisioned with the access rights appropriate for their roles. IT security departments need to address these challenges cost-efficiently. In this “for dummies” e-book, learn how cloud-managed network access control (NAC) can help.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Extreme Networks

NetMotion: Uncompromised Secure Access
sponsored by NetMotion
VIDEO: Workers are now working from everywhere, and VPNs are no longer able to provide ample protection in our increasingly mobile world. You need complete visibility into what’s happening on all your devices, no matter where they are. Where can you get it? Take a pause to watch this short video examining NetMotion’s SDP.
Posted: 11 Jan 2021 | Premiered: 11 Jan 2021

NetMotion

The iboss cloud Zero Trust Network Access (Z TNA) Private Access Platform architecture
sponsored by iBoss
WHITE PAPER: Organizations deploying and using legacy network security appliances to protect cloud connectivity and internet access are faced with the problem of the disappearing network perimeter. But zero trust network access can ensure fast, compliant and secure connections from anywhere. Download this white paper to explore zero trust in detail.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

iBoss

Customer attitudes to digital identity
sponsored by Onfido
WHITE PAPER: Digital identity is often discussed in the context of the benefits it provides the organization – but what about its impact on the customer? This report provides a closer look at the importance of digital identity for customer relationships, general perception and current solutions that may be worth your consideration – read on to get started.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences