IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Management of Identity

RSS Feed   
Management of Identity Reports
 
Robotic Process Automation Whiteboard Video
sponsored by CyberArk Software, Inc
VIDEO: Robotic Process Automation (RPA) platforms can provide organizations with great benefits. However, these platforms introduce a new threat vector based on human and non-human identities. In this video, discover 5 security best practices organizations should consider incorporating into their RPA workflows.
Posted: 05 Nov 2019 | Premiered: 05 Nov 2019

CyberArk Software, Inc

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

RPA Security Best Practices
sponsored by CyberArk Software, Inc
WEBCAST: Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.
Posted: 07 Nov 2019 | Premiered: Nov 7, 2019

CyberArk Software, Inc

CyberArk Privilege Cloud Whiteboard Video
sponsored by CyberArk Software, Inc
VIDEO: CyberArk Privilege Cloud can help your organization discover and manage privileged credentials on-premises, in the cloud, and hybrid environments. In this video, Andrew Silberman from CyberArk discusses the benefits of CyberArk Privilege Cloud and helps you evaluate if it is a good fit for your organization.
Posted: 24 Oct 2019 | Premiered: 24 Oct 2019

CyberArk Software, Inc

Building a Well-Managed Cloud Application
sponsored by Okta
WHITE PAPER: In this white paper, learn how you can increase user adoption and overall usability by simplifying user access and change management.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

Security for Cloud and On-Premises Deployment
sponsored by Mendix
WHITE PAPER: In this whitepaper, take an in-depth look at the Mendix platform, specifically as it relates to security for cloud, private cloud & on-premises environments. Download this report & discover why businesses across multiple industries trust Mendix to oversee the protection of their mission-critical data.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Mendix

The Business Case for Securing Robotic Process Automation
sponsored by CyberArk Software, Inc
RESOURCE: As organizations consider Robotic Process Automation (RPA), CISOs and security leaders have a timely opportunity to present a business about applying strong cybersecurity to this transformative technology. In this article, find 3 ways to build the business case for RPA security – centered on protecting privileged access.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

CyberArk Software, Inc

Improving Lives Around the World through Easier Access to Knowledge
sponsored by PortSys
CASE STUDY: Learn how Research4Life was able to use PortSys Total Access Control to manage access across all programs and make the lives of end users around the world easier.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

PortSys

Top 5 Reasons to Put Privilege First
sponsored by CyberArk Software, Inc
WHITE PAPER: The reality is that no organization can ever fully secure all of their applications and infrastructure. Protection from all of the various methods that attackers may use is impossible; they will get in, it's what they do. In this white paper, learn why prioritizing privileged access should be at the core of every organization's strategy.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

CyberArk Software, Inc

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement