IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed   
Identity Management Security Reports
 
The 2019 Identity Report
sponsored by SailPoint Technologies
ANALYST REPORT: Today's business world is constantly evolving, bringing new opportunities as well as new risks. In this research report, discover key findings from SailPoint's evaluation of IT leaders including 3 key identity-related challenges that face enterprises today.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

SailPoint Technologies

5 Steps to Minimize Your Exposure to Ransomware Attacks
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Starbucks Combats Credential Stuffing and Account Takeover
sponsored by Shape Security
VIDEO: Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019

Shape Security

Zero Trust Access Today's IT Security Falls Short
sponsored by PortSys
RESOURCE: 78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

PortSys

The New Frontiers of Identity
sponsored by SailPoint Technologies
WEBCAST: While digital transformation has opened new paths to success, it has also created new frontiers for identity governance that must be addressed. In this webcast, Paul Trulove of SailPoint explains how you can take a comprehensive approach to identity governance.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

SailPoint Technologies

8 Best Practices for Identity and Access Management
sponsored by One Identity
WHITE PAPER: In this white paper, find 8 key practices that can help you improve your identity management system to ensure better security, efficiency and compliance.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

One Identity

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

Best Practices for Securing Privileged Access
sponsored by Hitachi ID
RESOURCE: In this resource, discover all of the key benefits and capabilities of Hitachi ID's Privileged Access Manager.
Posted: 07 May 2019 | Published: 07 May 2019

Hitachi ID

The IT Director's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 14 Aug 2019 | Published: 31 May 2019

Ping Identity Corporation

The Case for Open Source IAM
sponsored by WSO2, Inc.
WHITE PAPER: Open source IAM solutions are now gaining attention from enterprises similar to proprietary and commercial IAMs. Why? In this white paper, learn all about the benefits and use cases of open source for IAM today.
Posted: 13 May 2019 | Published: 13 May 2019

WSO2, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement