Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed   
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software Reports
1 - 25 of 171 Matches Previous Page  |  Next Page
Executive Brief: Why Secure Mobile Access Is A Strategic Business Imperative
sponsored by SonicWall
WHITE PAPER: According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.
Posted: 29 May 2020 | Published: 29 May 2020

SonicWall

How Okta and Netskope Delivered on BMC's Cloud Security Strategy
sponsored by Okta + Netspoke
CASE STUDY: In this blog post, Joel Bruesch, Sr. Director of Cybersecurity at BMC Software, overviews key security challenges he’s seen in his leadership role and highlights how BMC partnered with Okta and Netskope to build an identity-first cloud security.
Posted: 29 May 2020 | Published: 21 Jun 2019

Okta + Netspoke

Comprehensive Data Security and Access Control in Today’s Multi-Cloud World
sponsored by Okta + Netspoke
RESOURCE: Organizations are moving to the cloud, enhancing productivity but bringing about new security challenges. As environment grow more complex, organizations need to to find a way to provide secure cloud access for users. Continue reading to learn more about data security and access control in the era of multi-cloud environments.
Posted: 28 May 2020 | Published: 28 May 2020

Okta + Netspoke

OWASP Top 10: The Most Critical Risks Facing Web Applications
sponsored by F5 Networks
WEBCAST: Today’s organization uses an average of 983 different applications. As such, ensuring the protection of these web applications is critical for avoiding disruptive breaches and maintaining operational efficiency. In this webinar, explore the top 10 most critical risks facing today’s web applications and the steps you can take to mitigate them.
Posted: 28 May 2020 | Premiered: May 28, 2020

F5 Networks

Data Security with Okta and Netskope
sponsored by Okta + Netspoke
RESOURCE: As organizations continue to embrace the productivity and cost benefits of cloud capabilities, it’s now more important than ever the make sure the right security checks are in place to secure sensitive data. Read this blog post to discover the common points of failure, explore what a CASB is (and how it can help), and more.
Posted: 27 May 2020 | Published: 18 Jul 2018

Okta + Netspoke

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

IAM Leaders’ Guide to Privileged Access Management
sponsored by Centrify Corporation
RESOURCE: While traditional identity and access management (IAM) tools offer control of standard user access, they fail to manage shared use of privileged accounts or administrator privilege elevation. This Gartner report provides a comprehensive analysis of privileged access management, designed to be the next step in IAM.
Posted: 20 May 2020 | Published: 22 Jul 2019

Centrify Corporation

GDPR vs CCPA
sponsored by Auth0
EBOOK: Inside this guide to GDPR vs. CCPA, discover what businesses need to know to close compliance gaps between the two laws and how Auth0’s identity management platform can help.
Posted: 19 May 2020 | Published: 19 May 2020

Auth0

Providing Comprehensive Access Control & Data Security in Multi-Cloud Environments
sponsored by Okta + Netspoke
DATA SHEET: Today’s modern, flexible workforce requires a security strategy that is equally agile. For most organizations, identity management and access control is the answer. In this data sheet, take a closer look at a specific offering from Okta & Netskope, designed to meet security and productivity needs across multi-cloud environments.
Posted: 19 May 2020 | Published: 19 May 2020

Okta + Netspoke

Okta ASA Netskope Private Access demo
sponsored by Okta + Netspoke
VIDEO: In this video demo, join a Solutions Architect at Okta as they provide a quick walkthrough of how Okta Advanced Server Access & Netskope Private Access can work together to enhance user experience.
Posted: 18 May 2020 | Premiered: 12 Mar 2020

Okta + Netspoke

Securing Your Remote Employees with Cloud-Based Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Given the sudden and dramatic shift towards working from home, organizations have had to quickly enable their employees with remote access to the network. This buyer’s guide is designed to help determine which cloud-based authentication tool is best fit to meet your organization’s security needs and your employee’s operational requirements.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

Use Your Microsoft Certificate Authority for Passwordless Authentication
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

Passwordless Experience for A More Secure and Productive Workforce
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: Passwords are quickly becoming an outdated security tool, set to be replaced by passwordless authentication methods. In this solution brief, take a closer look at the key features and capabilities of Entrust Datacard’s passwordless authentication offering, designed to increase productivity, unify access and reduce password-related risks.
Posted: 08 May 2020 | Published: 08 May 2020

Entrust, Inc.

Best Practices for Securing Critical Infrastructure for State & Local Governments
sponsored by VMware International Unlimited Company
WHITE PAPER: For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.
Posted: 07 May 2020 | Published: 31 Jan 2020

VMware International Unlimited Company

SASE Series, Part 2: The Security View
sponsored by Hughes Network Systems
WHITE PAPER: A term coined by Gartner, Secure Access Service Edge (SASE) is an approach to network security designed to be the successor to data centers as organizations shift their data and endpoints to the cloud. In this blog post, dive deeper into the SASE approach, the growing attack surface, and its relationship with zero trust.
Posted: 07 May 2020 | Published: 30 Apr 2020

Hughes Network Systems

Duo for Device Trust
sponsored by Duo Security
PRODUCT OVERVIEW: As organizations continue to enable employees to work remotely and interact within their own devices, mobile security becomes an increasingly critical piece of the security strategy. In this solution brief discover how Duo’s zero trust approach offering can help organizations meet their security and compliance goals.
Posted: 06 May 2020 | Published: 06 May 2020

Duo Security

Don’t Give Away Keys to Your Kingdom with ADFS
sponsored by PortSys
RESOURCE: For years, organizations have been using Active Directory Federated Services (ADFS) to manage access to cloud applications. However, sole reliance on ADFS for managing these accounts can introduce risks. In this article, discover how Total Access Control (TAC), Portsys’ zero-trust offering, can help protect ADFS accounts from cyberattacks.
Posted: 06 May 2020 | Published: 28 Apr 2020

PortSys

Zero Trust - The Citrix Way
sponsored by Citrix
RESOURCE: For those who work in IT and security, whack-a-mole can sound a lot like their day-to-day jobs: Waiting for incidents to ‘pop up’ and reacting accordingly. But what if you knew where the problem holes were, and could cover them permanently? This article outlines the zero-trust approach, why it works, and how to achieve it.
Posted: 05 May 2020 | Published: 09 Dec 2019

Citrix

Duo for Microsoft Officer365, Azure, and Windows
sponsored by Duo Security
PRODUCT OVERVIEW: Organizations have been embracing the productivity benefits of Microsoft tools for several years. To get the most out of these applications, third-party security services, like Duo, can help organizations with their digital transformation initiatives. Read on to learn more about Duo and discover if its features match your objectives.
Posted: 04 May 2020 | Published: 04 May 2020

Duo Security

Zero Trust Evaluation Guide for the Workforce
sponsored by Duo Security
WHITE PAPER: To meet the scalability and security needs of today’s distributed business environments, organizations are adopting a zero-trust approach to manage access to sensitive data. In this white paper, take a look at the process of establishing secure trusted access from your users and their devices to work applications.
Posted: 04 May 2020 | Published: 04 May 2020

Duo Security

Omdia Market Radar: Zero-Trust Access
sponsored by Cloudflare
WHITE PAPER: Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.
Posted: 04 May 2020 | Published: 17 Mar 2020

Cloudflare

Duo Security's Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
WHITE PAPER: As passwords grow increasingly ineffective, new ways of authenticating users and managing identities are needed to ensure the protection of sensitive data. In this evaluation guide, learn the criteria for customizing your evaluation process and discover how to assess the efficacy of a two-factor authentication tool.
Posted: 01 May 2020 | Published: 01 May 2020

Duo Security

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO: Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020

Thales
1 - 25 of 171 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info