IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management (Security)

RSS Feed   
Identity Management (Security) Reports
Reduction In Time To Onboard Customers
sponsored by Onfido
CASE STUDY: Grover is a German lending & eCommerce (or “Rent Tech”) company. To reduce risk, Grover perform a detailed review on each business customer signing up to their system to verify their identity – but it was an expensive, manual process. View this case study to learn how Onfido helped them to verify customers at scale with low risk.
Posted: 30 Mar 2021 | Published: 30 Mar 2021


Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by
EGUIDE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud
sponsored by Ionic Security
PRODUCT OVERVIEW: In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Ionic Security

To Verify New Customer Identities
sponsored by Onfido
CASE STUDY: Aion Bank is a subscription-only digital bank. Currently, digital makes fulfilling regulatory requirements such as ‘Know Your Customer’ (KYC) a challenge, meaning this Bank needed strong confidence in their customers’ identities in a remote setting. Download this case study to learn how Aion Bank made customer onboarding as seamless as possible.
Posted: 25 Mar 2021 | Published: 25 Mar 2021


Overcoming The Legacy Vpn Dilemma Zero Trust Access With Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access tools enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Why IAM policies are crucial post pandemic
sponsored by Beta Systems
EGUIDE: Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management (IAM). Find out why IAM policies are crucial in the new normal.
Posted: 02 Apr 2021 | Published: 01 Apr 2021

Beta Systems

A Guide To Digital Identity Verification: The Technology And Trends
sponsored by Onfido
WHITE PAPER: Both traditional and all-digital businesses need to onboard new users to their services remotely – but they also need to monitor the risks to their platform as their user base increases. Download this white paper to explore how you can use machine learning (ML) to securely onboard anyone, anywhere with an internet connection.
Posted: 25 Mar 2021 | Published: 25 Mar 2021


8 Reasons Identity & Access Management is so Important
sponsored by Beta Systems
EGUIDE: Inside this e-guide find 8 reasons why IAM is so important and different technology that supports it.
Posted: 01 Feb 2021 | Published: 29 Jan 2021

Beta Systems

SIG - SASE in 15 minutes
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Keeper Business Datasheet
sponsored by Keeper Security Inc
DATA SHEET: 81% of data breaches are due to weak, default or stolen passwords – a massive vulnerability that could be addressed with effective password management. In this data sheet, take a closer look at the key features and benefits of Keeper’s password management offering.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences