IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity and Access Management

RSS Feed   
Identity and Access Management Reports
 
Zero Trust eXtended Ecosystem Platform Providers
sponsored by Ionic Security
WHITE PAPER: This Forrester Wave Report evaluates the top vendors and offerings within the Zero Trust platform market – read on to unlock the vendor comparison matrix, scoring criteria and an in-depth analysis of each of the 15 most significant Zero Trust platform providers.
Posted: 06 Oct 2020 | Published: 24 Sep 2020

Ionic Security

Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

THE CYBERARK PRIVILEGED ACCESS SECURITY SOLUTION FOR U.S. FEDERAL GOVERNMENT AGENCIES
sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International

Onfido’s Identity Fraud Report 2020
sponsored by Onfido
RESEARCH CONTENT: Each year, fraudsters find new and more effective ways to benefit from cyberthreats – the pandemic of 2020 made it an especially profitable year for fraudsters. Read this identity fraud research report to learn more about the emerging threat types and most effective security techniques.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

A RISK-BASED APPROACH TO INSIDER THREAT DETECTION FOR FEDERAL GOVERNMENT AGENCIES
sponsored by Merlin International
WHITE PAPER: Malicious insiders, regardless of motive, continue to establish themselves as a major threat, especially amongst United States federal government agencies. This white paper offers comprehensive insights into the role of privileged access management as an effective countermeasure against insider threats – read on to get started.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

From Zero to Hero: The Path to CIAM Maturity
sponsored by Okta
EBOOK: No matter how far along each company is on their identity journey, there’s a common set of challenges they face at every step. Download this e-book for clear next steps to take on the road to continuous customer identity and access management.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Okta

Customer attitudes to digital identity
sponsored by Onfido
WHITE PAPER: Digital identity is often discussed in the context of the benefits it provides the organization – but what about its impact on the customer? This report provides a closer look at the importance of digital identity for customer relationships, general perception and current solutions that may be worth your consideration – read on to get started.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

Zero Trust Security
sponsored by Tech Data
RESOURCE: Last year, the average cost of a data breach was $4 million – a number that’s expected to rise over the coming years. In order to better balance the onslaught of cyberattacks with compliance requirements, organizations should consider zero trust security more seriously – read this infographic to find out why.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Tech Data

Buyer's Guide For Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
EBOOK: This PAM Checklist is a thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. It will help you identify where to begin your privileged access management project, how to progress to a better IT security posture, and what business outcomes to expect.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

BeyondTrust Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences