IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Management of Identity

RSS Feed   
Management of Identity Reports
 
Is Biometrics the Future of Security?
sponsored by One Identity
EBOOK: Biometrics is the automated recognition of individuals based on their behavioral and biological characteristics. Learn why it's important to your business's security and why passwords may not be unique enough anymore.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

What Hackers Know That You Don't
sponsored by Evident
WHITE PAPER: Companies such as LinkedIn, Uber and Equifax have all been victims of significant data hacks. In this white paper, uncover some basics of how breaches happen and where data travels when they do, as well as how you can strengthen security protocols to prevent breaches in the future.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

The Future of Privilege Management - Understanding the Bigger Picture
sponsored by One Identity
VIDEO: In this on-demand webcast, join two IAM experts, Martin Kuppinger and Jackson Shaw, as they talk about the evolution of the Privilege Management market and where the market is moving to.
Posted: 23 Aug 2018 | Premiered: 20 Aug 2018

One Identity

Secure Software Development in the Financial Services Industry
sponsored by GitHub
RESOURCE: Find out how financial service institutions (FSIs) can meet strict security regulations and create a culture of truly secure software development to deliver the best possible products while safeguarding customer data.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

GitHub

Implementation Options for MFA
sponsored by Ping Identity Corporation
DATA SHEET: Learn how your organization can implement adaptive multi-factor authentication (MFA) while balancing secure access to applications with ease of use for the end user.
Posted: 10 Dec 2018 | Published: 10 Dec 2018

Ping Identity Corporation

The Cost of Credential Stuffing: A Poneman Institute Research Report
sponsored by Akamai Technologies
RESEARCH CONTENT: Uncover the survey results from this Ponemon Institute survey regarding, the costs of credential stuffing, volume of user attacks, the top 5 consequences of credential stuffing, and more.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

Akamai Technologies

The Breach Prevention Playbook: Simple Ways to Get IAM Right and Protect Your Organization
sponsored by One Identity
RESOURCE: Explore the IAM practices and technologies that provide the best path to cybersecurity that can bolster your chances of surviving and enable your organization to emerge with minimal damage.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 02 Aug 2018 | Published: 31 Oct 2016

IBM

Deploy Silent Security to Protect Identities and future-proof your IAM
sponsored by IBM
WHITE PAPER: Find out how you can deploy silent, nonintrusive identity and access management (IAM) that can weed out the bad actors without hindering employee productivity.
Posted: 24 Jul 2018 | Published: 30 Nov 2017

IBM

Fighting Fraud with Intelligent Access Management
sponsored by IBM
WHITE PAPER: Find out how you can become a leader in the fight against fraud with intelligent access management and authorization, designed for holistic fraud prevention.
Posted: 24 Jul 2018 | Published: 31 Jul 2016

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement