IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management (Security)

RSS Feed   
Identity Management (Security) Reports
 
How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Fighting Fraud —the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Read on to learn how your organization can implement identity best practices without adding friction to any digital onboarding experience.
Posted: 23 May 2019 | Published: 23 May 2019

Onfido

Cybercriminals Are More Cunning Than Ever: Stay One Step Ahead
sponsored by Lenovo and Intel
RESOURCE: Cybercriminals are more cunning than ever, so it's increasingly important for you to find ways to help your organization stay one step ahead. Learn about ThinkShield by Lenovo and find out how you can keep your devices and data safe.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

Lenovo and Intel

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

ComputerWeekly.com

'Friendly Friction' the Guide to Optimizing Onboarding
sponsored by Onfido
EBOOK: Tools that make your life more convenient also tend to make it less secure. That being said –when it comes to user onboarding, there's still a tension between onboarding users quickly and keeping compliant. In this white paper, learn 5 ways to make friction friendlier and achieve secure onboarding.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Onfido

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Onfido

Hitachi ID Privileged Access Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: In this product overview, learn about the Hitachi ID Privileged Access Manager and how it can secure access to high risk accounts and groups, replace static, shared passwords with periodically changing random values, and much more.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

A Guide to WSO2 Identity Server
sponsored by WSO2, Inc.
WHITE PAPER: WSO2 Identity Server aims to address both API and user domains while providing an enhanced user experience as part of WSO2's open source Integration Agile Platform. Read on to learn more about the benefits and use cases of WSO2 Identity Server.
Posted: 13 May 2019 | Published: 13 May 2019

WSO2, Inc.

A Guide To Fraud In The Real World
sponsored by Splunk Services UK Ltd
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk Services UK Ltd

Threat-Driven Multifactor Authentication (MFA)
sponsored by Silverfort
RESOURCE: In this solution brief, learn how Check Point and Silverfort have partnered to deliver dynamic threat-driven authentication. With this integration, any threat detected by Check Point is leveraged by Silverfort's policy engine to trigger step-up authentication in real-time.
Posted: 24 May 2019 | Published: 16 Mar 2018

Silverfort
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement