IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management (Security)

RSS Feed   
Identity Management (Security) Reports
 
Transform Business Processes with Electronic and Digital Signatures
sponsored by Adobe Systems, Inc.
WHITE PAPER: Discover how e-signatures provide advanced security measures to ensure your docs are as safe as they are compliant, especially with regard to growing domestic and international regulations. Plus find out the difference between e-signatures and digital signatures and how one solution may be the cost-effective answer for your business.
Posted: 07 May 2018 | Published: 30 Nov 2017

Adobe Systems, Inc.

Dispelling the Myths of Single Sign-On Portals vs. Full-Featured IAM Systems
sponsored by Identity Automation
EBOOK: The average enterprise now relies on 935 different cloud applications, according to Netskope's Cloud Report. Utilize this resource to decide whether or not your enterprise needs an IAM approach that goes beyond single sign-on to effectively secure your cloud applications.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Single Sign-On (SAML) Vulnerabilities Prompt Security Experts to Consider Certificate-Based Authentication Options for Enterprise Security
sponsored by HID Global
RESOURCE: This blog post highlights an alternative to SAML-based single sign-on and how certificate-based authentication works.
Posted: 11 May 2018 | Published: 06 Mar 2018

HID Global

Establish Your Blueprint For Centralized SSL Certificate Lifecycle Management
sponsored by Entrust, Inc.
WHITE PAPER: Whether due to security events, industry changes, or compliance requirements, the need to identify and manage SSL certificates is critical. This resource offers security and business challenges and reveals a 4 step process for moving to an SSL certificate services platform.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Entrust, Inc.

The Changing Face of Privileged Access Management
sponsored by One Identity
VIDEO: Hear from Kelly Hardy and Tyler Reese from One Identity about the importance of privilege access management (PAM) and how you can maintain frictionless security for your organization.
Posted: 18 May 2018 | Premiered: 15 May 2018

One Identity

New Topics on the New Security+ SYO-501 Exam
sponsored by Global Knowledge
RESOURCE: It has been 3 years since the last revision of the CompTIA Security+ exam. In this resource, industry expert James Michael Stewart explains the updates to the exam and everything you need to know to prepare.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Global Knowledge

Preparing Your Organization for the GDPR
sponsored by Imperva
WHITE PAPER: Where does your organization stand in terms of GDPR preparedness? Access this resource to uncover 5 questions to determine what GDPR means for your organization and how to prepare.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Imperva

Top 5 Ways to Relieve the Pain of Managing Hybrid AD Environments
sponsored by One Identity
WHITE PAPER: According to One Identity, nearly 90% of organizations worldwide are using Active Directory (AD) for on-premises resources. This e-book addresses 5 challenges that organizations must overcome as they navigate the transition to a hybrid AD implementation.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

Market Guide for Endpoint Detection and Response Solutions
sponsored by enSilo
RESOURCE: The endpoint detection and response (EDR) market is rapidly growing as security and risk management leaders seek adaptive security architecture. Take a look at this Gartner Market Guide to uncover various endpoint detection and response strategies.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement