IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed   
IM (Identity Management) Reports
 
5 Steps to Minimize Your Exposure to Ransomware Attacks
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Remote Vendor Access: A Growing Attack Vector
sponsored by Cyber-Ark Software
WHITE PAPER: Organizations today rely on 3rd party vendors more than ever. Although these arrangements can provide valuable services, they also bring with them significant security considerations and risk. In this white paper, learn about CyberArk Alero which is designed to provide fast, easy and secure privileged access for remote vendors.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cyber-Ark Software

Understand How SSO and MFA Improve Security
sponsored by OneLogin
WHITE PAPER: IT departments are in a tough spot when it comes to security. The most common attacks are aimed at obtaining user credentials, with the password being the critical element. In this white paper, learn why secure SSO and risk-aware MFA are the golden keys to protecting your organization's sensitive information.
Posted: 26 Jul 2019 | Published: 26 Jul 2019

OneLogin

Safeguarding PeopleSoft Against Direct Deposit Theft
sponsored by Appsian
WHITE PAPER: In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

New Tech: Early Adopters Find Smart 'Zero Trust' Access Improves Security Without Stifling Innovation
sponsored by PortSys
RESOURCE: Abused logon credentials continue to fuel the never-ending escalation of cyberattacks. However, the Zero Trust approach could be well on its way to changing this. In this blog, uncover key findings from a recent discussion Byron Acohido of The Last Watchdog, had with PortSys' CEO Michael Oldham about Zero Trust.
Posted: 27 Sep 2019 | Published: 22 Jul 2019

PortSys

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation

Identity & Access Management – Securing the Modern Workplace With Microsoft 365
sponsored by Core BTS
WHITE PAPER: Cyberthreats are the top concern among leaders heading up companies of all sizes, and identity and access management (IAM) is a foundation of enterprise cybersecurity. In this white paper, discover how to secure the modern workplace with Microsoft 365.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Core BTS

Identity Is Not Security – Context Is King
sponsored by PortSys
RESOURCE: Identity is still important to security, but identity alone is NOT security. By binding user credentials with security policies based on the multiple factors within context of access, organizations today can significantly strengthen the protection of their enterprise resources, and ultimately, their bottom line. Read this article to learn more.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

PortSys

2019 True Cost of Fraud Study
sponsored by LexisNexis® Risk Solutions
ANALYST REPORT: The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study explores the evolution, expansion and cost of fraud to deliver insights and recommendations on how to effectively sustain your business, successfully manage fraud risks and strengthen customer trust and loyalty. Download the report to explore key findings.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

LexisNexis® Risk Solutions

Securing Robotic Procession Automation (RPA) with CyberArk
sponsored by CyberArk Software, Inc
WHITE PAPER: Robotic process automation (RPA) enables businesses to execute their digital transformation initiatives by providing a framework to carry out processes faster, longer, more efficiently & with a higher level of quality. In this cheat sheet, discover the benefits of RPA & a service designed to add a layer of security to your RPA strategy.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement