IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed   
Identity Management Security Reports
 
Privilege Access Management as a Service: Why It Matters
sponsored by CyberArk Software, Inc
RESOURCE: PAM as a Service is a great way for organizations to quickly secure their critical resources and systems without the need to manage additional infrastructure. In this CyberArk blog post, discover how CyberArk Privilege Cloud can help to meet organizational needs and more.
Posted: 05 Nov 2019 | Published: 29 Oct 2019

CyberArk Software, Inc

Protecting Data in The Cloud 2019 Thales Cloud Security Study
sponsored by Thales
WHITE PAPER: During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data.Download the executive summary to discover the key findings of the research.
Posted: 11 Nov 2019 | Published: 31 Oct 2019

Thales

Airline Stops Automated Attacks on Web & Mobile
sponsored by Shape Security
CASE STUDY: A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

Buyer’s Guide for Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
WHITE PAPER: Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

BeyondTrust Corporation

Securing Transportation Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.
Posted: 16 Sep 2019 | Published: 30 Apr 2019

Cyber-Ark Software

Security for Cloud and On-Premises Deployment
sponsored by Mendix
WHITE PAPER: In this whitepaper, take an in-depth look at the Mendix platform, specifically as it relates to security for cloud, private cloud & on-premises environments. Download this report & discover why businesses across multiple industries trust Mendix to oversee the protection of their mission-critical data.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Mendix

The 2019 Zero Trust Privilege Maturity Model Report
sponsored by Centrify Corporation
ANALYST REPORT: To provide context around the current state of Zero Trust Privilege, Centrify surveyed 1,300 information security professionals. Download this 2019 report to learn more about the Zero Trust Privilege Maturity Model and discover key findings from the survey.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

The End of the Password?
sponsored by Onfido
EGUIDE: Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.
Posted: 30 May 2019 | Published: 29 May 2019

Onfido
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement