IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed   
Identity Management and Access Control Reports
 
Keeping Remote Workers Safe and Your Work Secure
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER: This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019

Beta Systems

Success from the Start: Top Tips For Beginning An ID Badge Or Card Program
sponsored by HID Global
EBOOK: For organizations embarking on an ID badge/card program there are a number of key implementation steps and often overlooked – but vital – considerations to make to ensure success from the start. This eBook provides insight into these planning considerations, and more – read on to unlock your copy.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 15 Jan 2021 | Published: 19 Jan 2021

ComputerWeekly.com

Beyond Identity and Okta Solution Brief
sponsored by Beyond Identity, Inc.
PRODUCT OVERVIEW: Password-based authentication methods and a thing of the past. This solution brief explores the partnership between Beyond Identity and Okta, highlighting how they are working together to help organizations eliminate passwords, improve user experience, reduce IT costs, and more – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

Arrow & RSA Video 1: Password-less Authentication
sponsored by Arrow & RSA
PODCAST: Passwords have been trusted by organizations for decades, and they’ve worked well, but as time goes on, bad actors are getting smarter and smarter, and passwords are getting weaker and weaker. So, what does the future of authentication hold if not passwords? Listen to this RSA-sponsored discussion about password-less authentication to find out.
Posted: 23 Dec 2020 | Premiered: Dec 23, 2020

Arrow & RSA

Loyalty for Sale – Retail and Hospitality Fraud
sponsored by Akamai Technologies
ANALYST REPORT: The numbers speak for themselves: Retail, travel and hospitality all attracted a startling 63% of credential stuffing attacks and 41% of web attacks. In this new State of the Internet/Security report, Akamai goes beyond this data, taking you into the criminal marketplace that makes these industries and their loyalty programs such popular targets.
Posted: 04 Nov 2020 | Published: 30 Oct 2020

Akamai Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info