Software  >   Systems Software  >   Security Software  >   Network Security Software  >  

Network Access Control Software

RSS Feed   
Network Access Control Software Reports
 
Cybersecurity Risk: A Board’s-Eye View Chapter 4
sponsored by PortSys
WHITE PAPER: Access control is now the single most important aspect of an organization’s security architecture. What if you could view the context of a user’s access request, then have that request analyzed against your security policies for authentication? Read this brief to look at Total Access Control by PortSys.
Posted: 29 Sep 2020 | Published: 01 Aug 2020

PortSys

Frost & Sullivan Best Practices Award
sponsored by Onfido
WHITE PAPER: The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Onfido

Protecting Intellectual Property with Data Access Governance
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

SailPoint Technologies

SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise
sponsored by SailPoint Technologies
TECHNICAL ARTICLE: The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

SailPoint Technologies

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

Omdia Market Radar: Zero-Trust Access
sponsored by Cloudflare
WHITE PAPER: Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.
Posted: 04 May 2020 | Published: 17 Mar 2020

Cloudflare

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Security Access Controls Over Identities Must Be Priority
sponsored by SearchSecurity.com
EGUIDE: No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
Posted: 12 Jun 2020 | Published: 12 Jun 2020

SearchSecurity.com

Securing Business Critical Apps in the Age of Digital Transformation
sponsored by CyberArk Software, Inc
WHITE PAPER: Digital transformation has had a dramatic impact on application security – highlighting a distinct gap between perceived security effectiveness and the harsh reality. Read this white paper to learn more about this inverse relationship and discover 5 ways to secure your organization’s business critical applications.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info