IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity and Access Management

RSS Feed   
Identity and Access Management Reports
 
Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

Privileged Account Management for Dummies
sponsored by IBM
EBOOK: In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Endpoint Security: Protecting Your Business Wherever It Goes
sponsored by Dell SecureWorks
WHITE PAPER: The spread of COVID-19 forcing organizations to quickly shift towards working from home introduced a litany of new endpoint security risks while also amplifying existing ones. Read this white paper for a closer look at these challenges and best practices for addressing them.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

Protecting Intellectual Property with Data Access Governance
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

SailPoint Technologies

The Future of Network Security Is in the Cloud
sponsored by Palo Alto Networks
ANALYST REPORT: Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.
Posted: 15 Oct 2020 | Published: 30 Aug 2019

Palo Alto Networks

Zero Trust eXtended Ecosystem Platform Providers
sponsored by Ionic Security
WHITE PAPER: This Forrester Wave Report evaluates the top vendors and offerings within the Zero Trust platform market – read on to unlock the vendor comparison matrix, scoring criteria and an in-depth analysis of each of the 15 most significant Zero Trust platform providers.
Posted: 06 Oct 2020 | Published: 24 Sep 2020

Ionic Security

Maintain Business Continuity with Aruba's Remote Access Solutions
sponsored by Aruba Networks
DATA SHEET: More people than ever before are now working remotely. But everyone still needs secure, reliable access to systems and applications, no matter where they are. How do you open up your network and still keep data secure? In this brief, learn how Aruba’s remote access solutions can help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Aruba Networks

Report, Zero Trust: What You Need to Know to Secure Your Data and Networks
sponsored by Gigamon
ANALYST REPORT: Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it’s time to rethink strategy. As Gigamon’s new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security.
Posted: 15 Sep 2020 | Published: 31 Mar 2020

Gigamon

An Executive’s Guide to Finding the Right ID Card Printing Provider
sponsored by HID Global
WHITE PAPER: Selecting the right ID card printing solution or partner can be overwhelming, especially as Secure Card Issuance becomes a priority for security physical access. To help you get started, this e-guide offers insight into the key features and basic requirements to look for in an ID card printer – read on to learn more.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

HID Global

Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters
sponsored by Tehama
WHITE PAPER: Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.
Posted: 27 Aug 2020 | Published: 29 Feb 2020

Tehama
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info