IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed   
IM (Identity Management) Reports
 
PortSys: Zero Trust e-book
sponsored by PortSys
EBOOK: Zero trust is gaining popularity due to its flexible approach to enterprise protection. According to the International Data Group, 52% of companies are researching or piloting a zero-trust model. If you’re considering a model of your own, read these 5 security questions to learn where you stand, and to see where you could benefit from zero trust.
Posted: 25 Sep 2020 | Published: 01 Aug 2020

PortSys

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

Gaining Control Over Cloud IAM Chaos
sponsored by DivvyCloud
WHITE PAPER: Cloud solutions demand identity and access management (IAM)—but with the growing complexity of cloud infrastructure, determining who (or what) has access to a cloud resource can seem impossible. Learn how to restore cloud visibility and regain control over cloud IAM complexity in this guide.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

DivvyCloud

The key implementation considerations for successful customer identity management
sponsored by Okta
VIDEO: In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

University Hospital Gets the Most Out of Mobility with Total Access Control
sponsored by PortSys
CASE STUDY: For Milton Keynes University Hospital (MKUH), enabling and securing access for every device, regardless of location, became critical as they looked to modernize their operations. In this case study, discover why MKUH decided to partner with PortSys and implement a zero-trust approach to access management in the form of Total Access Control.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

PortSys

4-step Work From Home Guide
sponsored by HCL Software
WHITE PAPER: When a crisis manifests, organizations need to respond quickly or risk insolvency. CISOs and security teams must continue to protect sensitive data while teleworking, and IT and security operations must work together to patch and remediate vulnerabilities. Read this BigFix white paper to learn the 4 core capabilities to support secure telework.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

HCL Software

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

The Password-less Enterprise: Using PKI To Replace Passwords For Identity And Access
sponsored by Sectigo
WHITE PAPER: Today’s IT security teams need to be able to authenticate identities throughout the enterprise —whether those identities belong to humans, devices, data or applications. Unfortunately, passwords are either too vulnerable or just plain forgotten (or misused). Read this white paper to learn about public key infrastructure, a password-less approach.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy
sponsored by Tehama
RESOURCE: As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Tehama
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info