Standards  >   Network Protocols  >  

Network Authentication Protocols

RSS Feed   
Network Authentication Protocols Reports
1 - 25 of 78 Matches Previous Page  |  Next Page
Single Sign-On Without the Complexity
sponsored by Citrix
EBOOK: An improperly managed SSO forces organizations to implement several access solutions from different vendors to cover their application landscape. In doing so, any productivity and user experience benefits are wiped out, zero trust becomes more difficult and costs go up. Take control of security – read this e-book on Citrix Workspace SSO.
Posted: 28 Sep 2020 | Published: 20 Aug 2020

Citrix

Cybersecurity Risk: A Board’s-Eye View Chapter 3
sponsored by PortSys
EBOOK: The zero trust market is becoming saturated, and organizations considering zero trust are having to do their homework when it comes to vendor selection and fit. For many, substantial factors will be ease of deployment and flexibility, as these will lower costs. Read this short brief to learn about Zero Trust Access by PortSys.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Cybersecurity Risk: A Board’s-Eye View Chapter 2
sponsored by PortSys
EBOOK: When it comes to zero trust architecture, there is no one-size-fits-all package. It’s crucial that you consider which type of zero trust could best suit your organization, especially given the recent spike in vendors boasting zero trust capabilities. Read this short white paper to learn the 3 different flavors of zero trust.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Cybersecurity Risk: A Board’s-Eye View Chapter 1
sponsored by PortSys
EBOOK: IT security is broken – what will it take to fix it? A growing concern across board rooms and C-suites worldwide, security in a changing landscape has drawn more attention to a zero trust ideology. But how do you know if it could work for your enterprise? Jump into these 5 critical security questions to give your posture some consideration.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Definitive Guide to Moving Target Defense for Automated Bot Attacks
sponsored by BotRX
WHITE PAPER: As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

BotRX

Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys

PortSys: Zero Trust e-book
sponsored by PortSys
EBOOK: Zero trust is gaining popularity due to its flexible approach to enterprise protection. According to the International Data Group, 52% of companies are researching or piloting a zero trust model. If you’re considering a model of your own, read these 5 security questions to learn where you stand, and to see where you could benefit from zero trust.
Posted: 25 Sep 2020 | Published: 01 Aug 2020

PortSys

Report, Zero Trust: What You Need to Know to Secure Your Data and Networks
sponsored by Gigamon
ANALYST REPORT: Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it’s time to rethink strategy. As Gigamon’s new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security.
Posted: 15 Sep 2020 | Published: 31 Mar 2020

Gigamon

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield
sponsored by Remediant
WEBCAST: Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.
Posted: 28 Aug 2020 | Premiered: Apr 9, 2020

Remediant

Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters
sponsored by Tehama
WHITE PAPER: Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.
Posted: 27 Aug 2020 | Published: 29 Feb 2020

Tehama

The Cost of Insider Threats: Global Report
sponsored by IBM
ANALYST REPORT: The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

IBM

Onboarding Third-Party IT Service Providers Doesn’t Have to be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: According to Gartner, the biggest challenge Chief Procurement Officers (CPOs) face is the time it takes to securely onboard outside organizations and vendors into their information systems and business apps. Read this white paper to learn the risks and challenges when hiring third-party IT service providers or providing remote network access.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Tehama

Assessing the Economic Impact of Cybereason
sponsored by Cybereason
ANALYST REPORT: As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.
Posted: 25 Aug 2020 | Published: 29 May 2020

Cybereason

Securing the Workplace of the Future
sponsored by Tehama
EBOOK: By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.
Posted: 24 Aug 2020 | Published: 27 Nov 2019

Tehama

Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond
sponsored by Tanium
WHITE PAPER: To accommodate the transformation to remote work, organizations have upended their traditional IT infrastructure and adopted decentralized networks, cloud-based services, and widespread usage of employees’ personal devices. This has revealed critical gaps in visibility. Use this white paper to learn how to fill these gaps and remain resilient.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Tanium

Protect Your Network Before Attacks Evolve
sponsored by Claranet
WEBCAST: Your most sensitive data lives on the endpoint and in the cloud. Fast reactions prevent potential breaches and require a combination of technology and resource. Watch this webinar on endpoint detection and response (EDR) demonstrating how you can fortify the edge with real-time monitoring and detection of malicious events on endpoints.
Posted: 24 Aug 2020 | Premiered: Aug 7, 2020

Claranet

Danger Within: Email and Security Awareness Training Strategies for Effective Account Takeover Protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

How to Achieve Zero Touch in a Zero Trust Environment
sponsored by BlackBerry
WEBCAST: Implementing perimeter-based security architecture against modern threats will prove futile. Today, security must be traced back to the user, and networks must always be assumed as hostile. But doing so puts employee productivity at risk. Watch this webcast to go in-depth about zero trust and it can be balanced with functionality.
Posted: 24 Aug 2020 | Premiered: Aug 24, 2020

BlackBerry

Cradlepoint NetCloud Work From Anywhere Solution vs. Consumer Grade Hotspots
sponsored by CradlePoint
DATA SHEET: Is your organization looking for a way to easily manage all of your devices at scale through the cloud, from anywhere? Is it important that you deploy consistent security policies to all of your routers? View this data sheet for an in-depth look at a solution that includes wireless routers with enterprise-class reliability, security and management.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

CradlePoint

Reliable Access to the Internet is Key to Distance Learning
sponsored by CradlePoint
DATA SHEET: An adaptable network must be in place in order for students to continue learning. New approaches to networking are required. Students must be able to reliably access the internet, and teachers must be able to access cloud applications – and it must all be secure. Read this white paper to learn the importance of LTE connectivity during this time.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

CradlePoint

e-book: Remote Workforce Security
sponsored by Dtex
EBOOK: Did you know that there’s a 78% increase in accidental data loss when employees work from home? Tap into this e-book to reveal more statistics like this and 3 ways your company can stay protected during this WFH era.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Dtex

Threat Report: Thanos Ransomware
sponsored by Cysiv
ANALYST REPORT: Thanos is a ransomware-as-a-service (RaaS) that allows users to build and customize ransomware to suit their specific needs. It’s still in development, but it’s popular because of its techniques and its ability to evade anti-malware. Authors are actively adding more features using publicly available tools. Read this report for specifics about RaaS.
Posted: 19 Aug 2020 | Published: 17 Jul 2020

Cysiv

Continuously Trust Zero
sponsored by IBM
WEBCAST: Data centers are no longer the control points they used to be, and therefore the traditional ‘perimeter’ defense is no longer as effective. As businesses shift to the cloud, DCs become increasingly distributed, and so more appointed security is required. Watch this webinar for a look at how a large company introduces a zero trust approach.
Posted: 18 Aug 2020 | Premiered: Jun 11, 2020

IBM
1 - 25 of 78 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info