IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

NAC

RSS Feed   
NAC Reports
 
Enabling a Zero-Trust Security Strategy
sponsored by Ionic Security
RESOURCE: Organizations are shifting from traditional perimeter security approaches to zero-trust strategies that focus on monitoring individual credentials and accounts in order to identify and isolate potential risks. In this blog post, discover how Ionic may be positioned to help your organization execute its zero-trust security strategy.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Ionic Security

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 01 Jun 2020 | Published: 02 Jun 2020

ComputerWeekly.com

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage

PortSys Delivers Clientless Citrix Desktops with Total Access Control
sponsored by PortSys
RESOURCE: In this resource, learn about Total Access Control (TAC), and find out how its features like advanced SSO can help you further strengthen Citrix Workspace and desktop security with a Zero-Trust approach.
Posted: 12 Mar 2020 | Published: 09 Mar 2020

PortSys

Okta + MuleSoft: Comprehensive API Access Control and Management
sponsored by Okta
DATA SHEET: As the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

Securing Your Remote Employees with Cloud-Based Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Given the sudden and dramatic shift towards working from home, organizations have had to quickly enable their employees with remote access to the network. This buyer’s guide is designed to help determine which cloud-based authentication tool is best fit to meet your organization’s security needs and your employee’s operational requirements.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

The Maturity of Zero Trust in Europe
sponsored by Okta
RESOURCE: While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO: Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020

Thales

Zero Trust Access Helps UK County Improve Productivity and Access Control
sponsored by PortSys
CASE STUDY: The initiation of GDPR caused widespread change in the way organizations handled consumer data across the EU. In this case study, follow the Essex County Council, keepers of personal data for their residents, through their post-GDPR journey towards zero-trust access control to enable their employees to collaborate in a secure environment.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

PortSys
 
Browse by Report Type:
NAC White Papers | NAC Multimedia | NAC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info