IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed   
Identity Management and Access Control Reports
 
How to detect the 7 types of document and identity fraud
sponsored by Onfido
WHITE PAPER: Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Onfido

Frost & Sullivan Best Practices Award
sponsored by Onfido
WHITE PAPER: The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Onfido

Remote Work Headaches: Security Risks to Mitigate Today
sponsored by TechTarget
RESOURCE: Organizations must amend their budgets to invest in technologies that can not only support remote access, but also foster employee collaboration. Not sure which way to proceed? After completing our online survey, download our brand-new guide to remote access security.
Posted: 01 Jun 2020 | Published: 10 Sep 2020

TechTarget

Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER: Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020

Thales

Passwordless Authentication: How Giving Up Your Password Might Make You More Secure
sponsored by Thales
WHITE PAPER: Password fatigue has become an epidemic, with 81% of breaches involving the use of weak or stolen credentials. As a result, enterprises are exploring ways to protect their networks without the use of passwords. Jump into this white paper to learn more and to see examples of passwordless authentication.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 01 Jun 2020 | Published: 02 Jun 2020

ComputerWeekly.com

Zero Trust Privilege for Dummies
sponsored by Centrify Corporation
EBOOK: To better protect against data breaches, the use of a Zero-Trust model has returned to the spotlight and seen huge growth in adoption. Instead of using the traditional approach of "trust, but verify," the Zero-Trust model implements "never trust, always verify" as its guiding principle. Download Zero Trust Privilege For Dummies to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

ZTNA: Default to Deny, Never Trust, Always Verify
sponsored by Palo Alto Networks
WEBCAST: Contrary to popular belief, Zero Trust and Zero Trust Network Access (ZTNA) are entirely different. Watch this webinar to learn more about the differences between them, the challenges ZTNA addresses, how organizations can embrace ZTNA, the key features of Palo Alto’s Prisma Access, and more.
Posted: 24 Jun 2021 | Premiered: Jun 24, 2021

TOPICS:  Access Control
Palo Alto Networks

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Security Access Controls Over Identities Must Be Priority
sponsored by SearchSecurity.com
EGUIDE: No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
Posted: 12 Jun 2020 | Published: 12 Jun 2020

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences