IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

NAC

RSS Feed   
NAC Reports
 
Guide to Zero Trust for Federal Agencies
sponsored by Gigamon
WHITE PAPER: Cyberattacks targeting federal agencies are growing in both volume and complexity, and existing tactics are unable to protect these networks. To meet rising threats, security leaders are adopting a zero-trust model, a concept that states that users, devices and apps can’t be trusted without authentication. Read on to learn more.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Gigamon

4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

7 Steps to SSO + MFA to On-Prem Apps
sponsored by Okta
WEBCAST: Learn how to use Okta Access Gateway to control access to Hybrid IT and on-prem web applications, all without changing how your on-prem web apps work today.
Posted: 25 Mar 2020 | Premiered: Mar 25, 2020

Okta

A Framework for Cybersecurity and Compliance
sponsored by OneNeck IT
WHITE PAPER: In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

OneNeck IT

Enabling a Zero-Trust Security Strategy
sponsored by Ionic Security
RESOURCE: Organizations are shifting from traditional perimeter security approaches to zero-trust strategies that focus on monitoring individual credentials and accounts in order to identify and isolate potential risks. In this blog post, discover how Ionic may be positioned to help your organization execute its zero-trust security strategy.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Ionic Security

The Superpower of “Yes! But…”
sponsored by PortSys
RESOURCE: There was a time not so long ago when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO! In this blog post, learn how and why security’s superpower of “NO!” turned into “Yes! But…”
Posted: 09 Oct 2019 | Published: 09 Oct 2019

PortSys

How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 07 Oct 2019 | Published: 08 Oct 2019

ComputerWeekly.com

Alero Demo
sponsored by CyberArk Software, Inc
VIDEO: As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

CyberArk Blueprint for Privileged Access Management Success
sponsored by Cyber-Ark Software
WHITE PAPER: In today’s threat landscape, external attackers and malicious insiders routinely exploit privileged accounts to steal sensitive data or cause operational disruptions. To address this, IT security leaders need to rethink their privileged access management (PAM) strategy. Read on to discover a blueprint for PAM success.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software
 
Browse by Report Type:
NAC White Papers | NAC Multimedia | NAC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info