IT Management  >   Systems Operations  >   Security  >   AAA  >  

Network Authentication

RSS Feed   
Network Authentication Reports
 
Credential stuffing attacks: What they are and how to combat them
sponsored by Auth0
WHITE PAPER: Credential stuffing attacks are one of the most common types of large-scale cyberattacks today. In fact, 29% of data breaches in 2019 involved the use of stolen credentials. So how can you combat them? Download this white paper for everything you need to know.
Posted: 20 May 2020 | Published: 20 May 2020

Auth0

Norfolk County Council Bolsters Productivity with IdentityIQ
sponsored by SailPoint Technologies
CASE STUDY: Norfolk County Council (NCC) needed to prioritize an identity-centric security program that alleviated the growing concern over disparate systems and manual processes. In this case study, learn how NCC leveraged SailPoint to manage the identities working within their organization for all types of employment.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

SailPoint Technologies

On The Radar: Axis Security Takes A Different Approach To Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Continuous Authentication as the Zero Trust Multiplier
sponsored by BlackBerry
RESOURCE: The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.
Posted: 10 Jul 2020 | Published: 14 May 2020

BlackBerry

Barracuda CloudGen Access
sponsored by Barracuda
DATA SHEET: Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Barracuda

Iot Platform Leader Armis Eliminates Dependency On Vpn Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Multifactor authentication methods, use cases and products
sponsored by SearchSecurity.com
EBOOK: Multifactor authentication protects businesses from cyberattacks by requiring two or more forms of authentication from the user before allowing access. In this buyer's guide, explore multifactor authentication methods, use cases and market-leading products before making a final buying decision.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

SearchSecurity.com

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

HYPR

The Digital Certificate: How It Works, Which to Buy
sponsored by SearchSecurity.com
EBOOK: If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences