IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed   
Identity Management Security Reports
Enable & Secure Your Remote Workforce
sponsored by BeyondTrust Corporation
EGUIDE: IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

BeyondTrust Corporation

Rethinking Reliance on Active Directory
sponsored by Okta
DATA SHEET: In the late 90s and early 00s, Active Directory (AD) was the primary method for identity management, and it worked well. However, times have changed, and so have identity needs and IT ecosystems. It’s time to rethink AD – read this data sheet to get started.
Posted: 12 Feb 2021 | Published: 12 Feb 2021


Verify User Identity With Cisco Secure Remote Worker
sponsored by Silver Peak and Red Swan
RESOURCE: Many software firms have put together identity and threat detection platforms in recent times – but what you need is a platform built to perform these functions with WFH at the heart of its design. Download this resource to view different scenarios in which Cisco Secure Remote Worker can enable secure access and detect threats.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Silver Peak and Red Swan

Buyer's Guide For Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
EBOOK: This PAM Checklist is a thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. It will help you identify where to begin your privileged access management project, how to progress to a better IT security posture, and what business outcomes to expect.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

BeyondTrust Corporation

Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
sponsored by
EZINE: In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

BlackBerry Cyber Suite
sponsored by BlackBerry
PRODUCT OVERVIEW: In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.
Posted: 29 Dec 2020 | Published: 29 Dec 2020


Enterprise VPN Software Solutions
sponsored by NetMotion
RESOURCE: Modern approaches to remote access such as SDP are emerging, but most enterprises will continue to need a robust VPN that meets the needs of the increasingly mobile workforce. As such, NetMotion has designed a VPN with a focus in optimizing experience for mobile workers. Access this product page to learn more.
Posted: 12 Jan 2021 | Published: 12 Jan 2021


Reduction In Time To Onboard Customers
sponsored by Onfido
CASE STUDY: Grover is a German lending & eCommerce (or “Rent Tech”) company. To reduce risk, Grover perform a detailed review on each business customer signing up to their system to verify their identity – but it was an expensive, manual process. View this case study to learn how Onfido helped them to verify customers at scale with low risk.
Posted: 30 Mar 2021 | Published: 30 Mar 2021


How To Reduce Complexity And Lower Costs By Modernizing Your Approach To Cybersecurity
sponsored by Microsoft
RESOURCE: Thanks to a massive spike in the remote workforce, IT is more complex than ever for administrators. What’s worse is that this added complexity increases security cost and risk, which puts organizations at a severe disadvantage against modern cyberthreats. Don’t get caught napping – read this article to learn steps to take to improve cybersecurity.
Posted: 15 Dec 2020 | Published: 15 Dec 2020


Gartner Market Guide to Zero Trust Network Access
sponsored by Axis Security
RESOURCE: If your organization is looking into zero trust network access (ZTNA), download this Gartner ZTNA Market Guide outlining key findings, recommendations, market direction and various ZTNA models and vendors.
Posted: 31 Mar 2021 | Published: 08 Jun 2020

Axis Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences