IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed   
IM (Identity Management) Reports
SASE & Zero Trust for Dummies
sponsored by VMware
EBOOK: Already, SASE is playing a big role in conversations about how to improve remote security and increase network efficiency. Now, zero-trust network access (ZTNA) can provide a user’s contextual identity to all the different SASE security services, making for a smarter, more secure edge. Download SASE & ZTNA For Dummies to learn more.
Posted: 25 Feb 2021 | Published: 25 Feb 2021


The Path To Zero Trust Starts With Identity
sponsored by CyberArk Software, Inc
WHITE PAPER: Identity-defined Zero Trust is a complex topic that touches almost every aspect of an organization's IT and security infrastructure. This report represents the collective experience and thought leadership of the Identity Defined Security Alliance (IDSA) and offers a unique and practical approach to understanding Zero Trust.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

CyberArk Software, Inc

Verify User Identity With Cisco Secure Remote Worker
sponsored by Silver Peak and Red Swan
RESOURCE: Many software firms have put together identity and threat detection platforms in recent times – but what you need is a platform built to perform these functions with WFH at the heart of its design. Download this resource to view different scenarios in which Cisco Secure Remote Worker can enable secure access and detect threats.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Silver Peak and Red Swan

Cybereason Video 2 – Live Attack Simulation
sponsored by Cybereason
WEBCAST: Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.
Posted: 26 Feb 2021 | Premiered: Feb 26, 2021


Manage Secrets throughout DevSecOps with Red Hat and CyberArk
sponsored by Red Hat
VIDEO: Emphasizing security throughout DevOps, also known as DevSecOps, has become a common practice across organizations. This webinar highlights how identity and access management (IAM) can fit into the software development lifecycle – watch this webinar to explore the role of IAM in DevSecOps.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

Keeping Remote Workers Safe Webcast
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021


6 Key Identity and Access Management Benefits
sponsored by Beta Systems
EGUIDE: Identity and access management (IAM) gives organizations an enhanced ability to oversee their digital identities. In a remote and hybrid world, the benefits of IAM are more pronounced than ever. Read this guide to take in 6 of these key benefits, and learn why adopting IAM practices gives you a competitive advantage.
Posted: 14 Apr 2021 | Published: 06 Apr 2021

Beta Systems

sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International

Can Your CIAM Solution Keep Up With The Market?
sponsored by Okta
RESOURCE: Okta and Pulse surveyed 100 product and engineering leaders to understand how well their customer IAM solutions meet the needs of the evolving market. Access the infographic to view the results.
Posted: 09 Mar 2021 | Published: 09 Mar 2021


Seeing Identity as the New Firewall
sponsored by SailPoint Technologies
DATA SHEET: If the entry method of choice for malicious actors is the users that connect all your organizational resources, protecting those identities must be your security. Think of your workers as the new perimeter and identity as your new firewall. Learn how to stay protected inside this solution brief.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

SailPoint Technologies

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences