IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed   
Identity Management and Access Control Reports
 
Creating an Identity-Aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Leading Change for CISOs: Embedding a Secure Culture
sponsored by RSA Conference
WEBCAST: There was a time when cybersecurity was strictly a concern for IT departments, but those days are long gone. In today’s far-reaching threat environment, cybersecurity needs to be baked into the very fabric of a company. In this webcast, learn how organizations can leverage organizational change models for an all-inclusive culture of security.
Posted: 21 Jan 2020 | Premiered: Oct 2, 2019

RSA Conference

CyberArk Alero Security
sponsored by CyberArk Software, Inc
DATA SHEET: Access management enables organizations to provide the same level of security to users, devices and apps whether they are remote or local. This data sheet takes a closer look at the CyberArk Alero architecture, which combines access management tools into one, unified platform. Read on to discover the features and capabilities of Alero.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc

Protecting Privileged Access in Robotic Process Automation
sponsored by CyberArk Software, Inc
WHITE PAPER: While Robotic Process Automation (RPA) offers a wide set of benefits, it also exposes an organization to a larger attack surface. In this report, CyberArk gathers the expertise of 12 global CISOs to provide practical RPA recommendations based on first-hand experiences and key findings. Read on to uncover the full report.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

CyberArk Software, Inc

Cisco Umbrella & Duo Security: Protect users and secure access to applications
sponsored by Cisco Umbrella
DATA SHEET: As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Cisco Umbrella

Total Access in a Zero Trust Environment
sponsored by PortSys
RESEARCH CONTENT: With the rate at which technology is changing, traditional security models are growing ineffective at providing adequate protection. Organizations require a scalable approach that is effective for securing on-premise and remote users. In this article, take a closer look at the increasingly popular zero-trust model for total access control.
Posted: 29 Jan 2020 | Published: 23 Jan 2020

PortSys

Secure Access to On-prem Apps & Hybrid Cloud Security
sponsored by Okta
DATA SHEET: In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Okta

Enable and Secure Remote Work During the COVID-19 Pandemic
sponsored by Barracuda
PRODUCT OVERVIEW: The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Barracuda

Digital Identity Security Assurance: How to Keep Your Customer Data Secure
sponsored by Akamai Technologies
WHITE PAPER: Customer identities are among the most critical and valuable assets of any organization. Failing to provide adequate security can result in financial, reputational, and even legal consequences. This paper highlights industry best practices for building customer trust through comprehensive security programs. Read on to learn more.
Posted: 23 Dec 2019 | Published: 30 Nov 2019

Akamai Technologies

CA SiteMinder Migration Guide
sponsored by Okta
WHITE PAPER: To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.
Posted: 24 Mar 2020 | Published: 30 Sep 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info