IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management (Security)

RSS Feed   
Identity Management (Security) Reports
 
Secure Access: Balancing Flexible Network Access with Enterprise-Class Security
sponsored by Fortinet, Inc.
WHITE PAPER: Read this white paper to find 3 products specifically designed to solve the problem of network access security in the mobile age, and decide for yourself which is the right choice for your business.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

Fortinet, Inc.

Managing User Risk: A Review of LogRhythm Cloud AI for User and Entity Behavior Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: SANS analyst and cybersecurity professional, Dave Shackleford, takes an in-depth look at user and entity behavior (UEBA) solutions that take advantage of machine learning intelligence capabilities.
Posted: 09 Aug 2018 | Published: 28 Feb 2018

LogRhythm, Inc.

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

Access Management Handbook
sponsored by Gemalto
EBOOK: When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 20 Apr 2018 | Published: 16 Aug 2017

Gemalto

Security for Containers – 5 Things DevOps Need to Do
sponsored by Aqua Security
WHITE PAPER: For security departments, adoption of containerization presents a multifaceted challenge. This resource reveals 5 things DevOps should know about securing containerized applications.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Aqua Security

Case Study: Node Africa Transforms Security
sponsored by VMware
CASE STUDY: It's not easy to navigate the dangers of the digital economy – it has caused a dramatic shift in the IT landscape, yet many IT organizations are still taking the same approach to security. This case study highlights a cloud service provider in Kenya secured their application infrastructure and streamlined compliance.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

VMware

IBM Security: Future of Identity Report
sponsored by IBM
RESEARCH CONTENT: In an era where personal information is no longer private, and passwords are commonly reused, the traditional scheme of accessing data and services by username and password has repeatedly shown to be inadequate. Explore this IBM Security Study for some key takeaways of the future of authentication.
Posted: 23 Jul 2018 | Published: 31 Jan 2018

IBM

Report – Market Guide for Privileged Access Security Management
sponsored by CA Technologies
ANALYST REPORT: In Gartner market guide for privileged access security management, learn about 24 vendors in this competitive and rapidly maturing market.
Posted: 26 Jul 2018 | Published: 22 Aug 2017

CA Technologies

Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

Integrating IAM into your Digital Workspace
sponsored by Citrix
EGUIDE: Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
Posted: 30 May 2018 | Published: 24 May 2018

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement