IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity and Access Management

RSS Feed   
Identity and Access Management Reports
 
Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 15 Jan 2021 | Published: 19 Jan 2021

ComputerWeekly.com

IAM Automation Controls Prevent the Risks in Higher Education
sponsored by Hitachi Vantara
RESOURCE: Higher education institutions face a unique set of identity and access management (IAM) challenges – namely finding and mitigating risks related to orphan and dormant accounts. Read this article to learn about how IAM automation controls can address these risks.
Posted: 11 Nov 2020 | Published: 30 Sep 2020

Hitachi Vantara

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

Use a Data Privacy Framework to Keep Your Information Secure
sponsored by Fasoo
EGUIDE: Security can be viewed in various ways, but it’s ultimately centered around data. We secure our networks, our passwords and even the doors to our buildings -- all to protect our data, and guarding this information through a data privacy framework is essential. Read this expert guide to learn 3 key areas of constructing such a framework.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Fasoo

Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access
sponsored by Arrow & RSA
WEBCAST: Digital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.
Posted: 23 Dec 2020 | Premiered: Aug 12, 2020

Arrow & RSA

Extreme Networks Special Edition Cloud-Managed Network Access Control (NAC)
sponsored by Extreme Networks
EBOOK: Today, an ever-growing number of corporate and guest devices need to be securely onboarded and provisioned with the access rights appropriate for their roles. IT security departments need to address these challenges cost-efficiently. In this “for dummies” e-book, learn how cloud-managed network access control (NAC) can help.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Extreme Networks

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info