IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management (Security)

RSS Feed   
Identity Management (Security) Reports
 
Software-Defined Perimeter
sponsored by NetMotion
RESOURCE: Now that remote work is nearly ubiquitous, employees are accessing company resources from a variety of devices and networks. This change widens an organization’s attack surface, and therefore, security teams are researching new technologies to protect networks – for example, the software-defined perimeter (SDP). Read more here.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

NetMotion

Government 2020: Modernizing And Securing Remote Work
sponsored by Okta
RESOURCE: Government agencies are scaling up telework to keep the public sector workforce productive, but what security challenges are plaguing them most? Download this infographic to understand the threats these agencies face and discover how a well-built access management strategy can help them handle these threats with confidence.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Okta

Hitachi ID Bravura Security Fabric
sponsored by Hitachi ID
DATA SHEET: Security teams are beginning to implement what are known as ‘fabrics’ in their stacks for a more across-the-board approach to security responsibilities. What benefits can implementing a fabric have when it comes to identity? Take a look at this data sheet to learn about Hitachi’s ID Bravura Security Fabric for digital identity management.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

Hitachi ID

THE CYBERARK PRIVILEGED ACCESS SECURITY SOLUTION FOR U.S. FEDERAL GOVERNMENT AGENCIES
sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International

Increase Productivity And Security With Sailpoint For Microsoft Teams
sponsored by SailPoint Technologies
DATA SHEET: Secure collaboration is top of mind for organizations that have adopted or plan to adopt Microsoft Teams. To enhance identity security within Teams, SailPoint has created a Teams integration that allows employees to access corporate resources from directly within the app. View this data sheet to get a closer look.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

SailPoint Technologies

The Guide To Just-In-Time Privileged Access Management
sponsored by BeyondTrust Corporation
EGUIDE: Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BeyondTrust Corporation

Verify User Identity With Cisco Secure Remote Worker
sponsored by Silver Peak and Red Swan
RESOURCE: Many software firms have put together identity and threat detection platforms in recent times – but what you need is a platform built to perform these functions with WFH at the heart of its design. Download this resource to view different scenarios in which Cisco Secure Remote Worker can enable secure access and detect threats.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Silver Peak and Red Swan

Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ComputerWeekly.com

Integrate Enterprise Identities
sponsored by Okta
DATA SHEET: Learn how Okta Customer Identity products can help reduce the administrative overhead that comes with integrating enterprise identities.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

Okta

Use Group Rules to Automate & Granularly Manage Access
sponsored by Okta
WEBCAST: Organizations using Okta for IAM know the importance of groups. But managing these groups is a hassle for admins, and it becomes more complicated as the number of users or groups increases, leading to security risks. Watch this webinar to learn how to you can use Okta’s Group Rules to automate app assignments and enforce granular access.
Posted: 01 Mar 2021 | Premiered: Mar 1, 2021

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences