IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed   
IM (Identity Management) Reports
 
KuppingerCole Report Executive View: One Identity Safeguard
sponsored by One Identity
ANALYST REPORT: Download this white paper to learn about a privileged management platform and how it can help you manage security risks associated with the use of privileged accounts in an organization.
Posted: 21 Aug 2018 | Published: 31 Jul 2018

One Identity

Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

Two-Factor Authentication That Makes Users and IT Security Happy
sponsored by One Identity
WHITE PAPER: Download this white paper to learn about One Identity, an identity and access management tool that uses a set of factors to assess the risk a given access attempt represents, and respond with appropriate security measures.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

The Cost of Credential Stuffing: A Poneman Institute Research Report
sponsored by Akamai Technologies
RESEARCH CONTENT: Uncover the survey results from this Ponemon Institute survey regarding, the costs of credential stuffing, volume of user attacks, the top 5 consequences of credential stuffing, and more.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

Akamai Technologies

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

OneLogin

When Making a Build vs. Buy Decision About IAM and Dynamic Authorization, Remember DIY's Hidden Costs
sponsored by Axiomatics
RESOURCE: If you're looking for IAM and dynamic authorization for your applications, it's not always clear whether you should build a solution in-house, or purchase from an outside vendor. In this resource take a look at the hidden costs of DIY to help decide which option is best for your organization.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Axiomatics

Identity-Driven Security
sponsored by Okta
WHITE PAPER: Find out how to bolster your security posture by upping your defenses against threats – both internal and external – with identity-driven security that strives to improve identity and access management as well as authentication.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Okta

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

Fighting Fraud with Intelligent Access Management
sponsored by IBM
WHITE PAPER: Find out how you can become a leader in the fight against fraud with intelligent access management and authorization, designed for holistic fraud prevention.
Posted: 24 Jul 2018 | Published: 31 Jul 2016

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement