IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed   
Identity Management and Access Control Reports
 
TeamViewer Tensor Conditional Access
sponsored by TeamViewer
RESOURCE: Download this infographic to learn how a rule-based engine like a firewall can help you prevent unauthorized remote access and protect your corporate network.
Posted: 19 Apr 2019 | Published: 19 Apr 2019

TeamViewer

How to Secure Your Post-Perimeter World
sponsored by Lookout
WHITE PAPER: As employees continue to use a mix of managed and unmanaged devices to access corporate resources, it sets up the need for a new security architecture: post-perimeter security. In this white paper, learn why the world is moving to post-perimeter security, what you need, and how to make it happen.
Posted: 06 May 2019 | Published: 06 May 2019

Lookout

5 Reasons Enterprises Need a New Access Model
sponsored by Akamai Technologies
WHITE PAPER: As VPNs, proxies, and remote desktops proliferate, businesses need a new way to manage network access to keep this perimeter safe. Learn the top 5 reasons you should consider a new application access management model.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Akamai Technologies

Biometrics: Learn the advantages and disadvantages
sponsored by Onfido
EGUIDE: When used in conjunction with other authentication factors, like passwords or tokens, biometric authentication methods have the potential to improve security as well as the user experience. In this e-guide, learn about the advantages of biometrics.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Onfido

HID ActivOne User Friendly Strong Authentication
sponsored by HID Global
WHITE PAPER: As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.
Posted: 11 Apr 2019 | Published: 02 Nov 2018

HID Global

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: This guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Celestix Networks

Identity and Access Management Tools to Look Out For
sponsored by Okta
ESSENTIAL GUIDE: Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.
Posted: 05 Apr 2019 | Published: 01 Apr 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement