IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed   
Identity Management Security Reports
 
Protect the Integrity of the Procurement Function
sponsored by SAS
WHITE PAPER: The procurement process is extremely complex and as a result, fraud detection is challenging. Take a look at this resource to uncover trends and best practices in detecting and preventing global procurement fraud.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

TOPICS: 
SAS

Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
EBOOK: This e-book details a comprehensive set of criteria to customize your evaluation to your organization's security needs and how to determine your ROI when deploying your two-factor authentication tools.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

TOPICS: 
Duo Security

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

TOPICS: 
OneLogin

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

TOPICS: 
OneLogin

Identity Industry Trends
sponsored by Onfido
VIDEO: The latest scams are making it almost impossible to know someone's true, human identity. View this video for past and emerging identity trends and how your organization can detect potential fraud.
Posted: 07 Feb 2019 | Premiered: 07 Feb 2019

TOPICS: 
Onfido

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Onfido

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

TOPICS: 
STEALTHbits

The Digital Certificate: How It Works, Which to Buy
sponsored by SearchSecurity.com
EBOOK: If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017

TOPICS: 
SearchSecurity.com

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

TOPICS: 
One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement