IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed   
Identity Management Security Reports
 
5 Myths About Identity Governance
sponsored by SailPoint Technologies
WHITE PAPER: Some may believe identity is just about governing access to certain applications or systems, but identity is more than access. In this white paper, discover 5 myths about identity governance.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

SailPoint Technologies

Enabling and Securing Digital Identities
sponsored by SailPoint Technologies
VIDEO: Learn how SailPoint’s Open Identity Platform enables and secures today’s digital identities.
Posted: 18 Mar 2020 | Premiered: 18 Mar 2020

SailPoint Technologies

CyberArk Provides Free Subscription to Alero
sponsored by Cyber-Ark Software
RESOURCE: CyberArk is offering qualified customers the use of CyberArk Alero at no cost through the end of May in hopes that it will help ease some of the burden associated with the changing work environment during COVID-19. Read this blog for more information.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Cyber-Ark Software

The Perimeter: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Identity and access management (IAM) is growing in popularity as a scalable and pragmatic security approach. This white paper highlights how IAM works, discusses the challenges to adopt this approach and provides IAM best practices to help you get started.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

F5 Networks

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

Building Cloud Services for Security: 3 Common Misconfigurations
sponsored by DivvyCloud
WHITE PAPER: Ensuring the secure configuration of a distributed set of cloud services is a critical piece to cloud transformation. In fact, most risk areas related to cloud come from security misconfigurations. This white paper highlights 3 common misconfigurations and explores ways to fix them or prevent them from happening.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

Secure Remote Access Readiness Webinar
sponsored by Pulse Secure
WEBCAST: Amidst the COVID-19 health crisis, organizations must adjust for increased mobility, connectivity and work from home mandates. This emergency workplace shift can stress IT infrastructure and operations. Join this webcast to listen as experts share real-world insights to ensure business resiliency, user productivity and secure access.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020

Pulse Secure

Adaptive Multi-Factor Authentication for PeopleSoft
sponsored by Appsian
DATA SHEET: In this data sheet, see how Appsian Security Platform allows customers to integrate third-party MFA solutions with PeopleSoft at login and within the application – all without custom code.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Appsian

Alero Demo
sponsored by CyberArk Software, Inc
VIDEO: As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

Bridging the Gap Between Active Directory and the Cloud
sponsored by Okta
WHITE PAPER: In this white paper, learn how you can integrate your legacy AD environment with modern SSO from Okta and the Okta Identity Cloud.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info