IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed   
Identity Management Security Reports
 
Prevent Fraud and Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organizations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of Mimecast’s email authentication offering.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Benefits of Migrating from Web Access Management (WAM)
sponsored by Okta
PRODUCT OVERVIEW: For organizations favoring hybrid IT environments, web access management (WAM) tools have historically offered effective security. However, as these organizations grew, WAM began to show signs of cracking. Read this white paper to learn more about the disadvantages of WAM and how to secure hybrid IT environments.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Okta

Beyond Identity and Ping Identity Solution Brief
sponsored by Beyond Identity, Inc.
DATA SHEET: With the increase in both cloud application use and remote work, creating and scaling access management controls is growing more complex. Read up on a new partnership that is working to solve this problem by delivering passwordless authentication, improved end-user experience, risk-based authorization and reduced IT costs and overhead.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Beyond Identity, Inc.

Cybersecurity Risk: A Board’s-Eye View Chapter 3
sponsored by PortSys
EBOOK: The zero-trust market is becoming saturated, and organizations considering zero trust are having to do their homework when it comes to vendor selection and fit. For many, substantial factors will be ease of deployment and flexibility, as these will lower costs. Read this white paper to learn about zero-trust access by PortSys.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Top Trends in Customer Identity and Access Management (CIAM) with analyst Mary Ruddy
sponsored by Okta
WEBCAST: Customer identity has gone mainstream. A seamless customer experience across devices is now expected. At the same time, security and privacy concerns are at an all-time high. View this webinar to hear from Gartner analyst Mary Ruddy and learn about findings from her recent research "Top 5 Trends in CIAM Solution Design".
Posted: 30 Sep 2020 | Premiered: Sep 30, 2020

Okta

Can Your CIAM Solution Keep Up with the Market?
sponsored by Okta
WEBCAST: Organizations must now respond to increasingly complex requirements to deliver seamless omnichannel experiences for their customers. But they must also work harder to keep sensitive customer data secure. To take customer security to the next level, view this webcast to learn more about customer identity access management.
Posted: 02 Oct 2020 | Premiered: Oct 2, 2020

Okta

solarisBank & Identity Management
sponsored by IDnow GmbH
CASE STUDY: solarisBank is a digital Banking-as-a-Service platform that allows companies to offer their own financial products. To remain regulatory, this emerging fintech company needed an identity solution that could verify customers via video and provide compliant e-signing capabilities. View this case study to see how IDnow was able to help.
Posted: 30 Oct 2020 | Published: 30 Oct 2020

IDnow GmbH

The Best Practices for Cloud Security Operations on AWS
sponsored by AllCloud
EBOOK: When it comes to cloud migrations, it’s important for organizations to recognize that they still own the responsibility of securing their cloud-based data and applications. To help you get started, this e-book provides a closer look at 6 areas to focus on for effective cloud security and overviews how to securely migrate to the cloud on AWS.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

AllCloud

CIAM vs. Enterprise IAM
sponsored by Ping Identity Corporation
RESOURCE: Understanding the opportunities that CIAM brings, how it's different than enterprise IAM and how to choose and implement a CIAM solution may seem like a daunting task. This guide will put you on the right path to selecting the best CIAM solution for your enterprise.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Ping Identity Corporation

Strong Customer Authentication (SCA)
sponsored by Vonage
WHITE PAPER: In recent years, Europe has ramped up on regulations concerning payment services and payment authentication. Legislation requires payment service providers (PSPs) to deliver strong customer authentication (SCA). Jump into this white paper to learn how to remain compliant without compromise.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Vonage
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info