IT Management  >   Systems Operations  >   Security  >   AAA  >  

Network Authentication

RSS Feed   
Network Authentication Reports
 
Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

TOPICS: 
WhiteHat Security

How Tanium Addresses the NIST Cybersecurity Framework
sponsored by Tanium
RESOURCE: Download this checklist to see how Tanium can help organizations meet the guidelines within the NIST Cybersecurity Framework.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 
Tanium

ALTR's Transformational, Blockchain-Based Data Security Platform Neutralizes the Privacy and Breach Exposures Created by the People Inside of Networks.
sponsored by ALTR
RESOURCE: Data risk is a part of almost every urgent technology conversation in the enterprise. Most issues are a result of the humans that are inextricable parts of our networks. Fortunately, the ALTR platform reduces data risks to virtually zero. In this white paper, learn how ALTR's platform provides visibility control and protection over valuable data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
ALTR

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

TOPICS: 
SAS

Securing the Modern Enterprise
sponsored by Duo Security
WHITE PAPER: The most difficult aspect of an enterprise to control is the human element. This white paper provides enterprises with strategic approaches for securing the enterprise and protecting against its weakest vulnerabilities.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

TOPICS: 
Duo Security

Protect the Integrity of the Procurement Function
sponsored by SAS
WHITE PAPER: The procurement process is extremely complex and as a result, fraud detection is challenging. Take a look at this resource to uncover trends and best practices in detecting and preventing global procurement fraud.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

TOPICS: 
SAS

Be Shielded From Every Angle in the Battle for Cybersecurity
sponsored by Lenovo & Microsoft
RESOURCE: Cybersecurity threats are all around you. It is important to shield against these threats from every angle. ThinkShield by Lenovo offers a comprehensive suite of end-to-end security offerings, with cutting-edge innovation that keep you safe.
Posted: 25 Jan 2019 | Published: 16 Oct 2018

TOPICS: 
Lenovo & Microsoft

Magic Quadrant for Access Management, Worldwide
sponsored by OneLogin
RESEARCH CONTENT: Uncover this market evaluation of leading access management providers such as, IBM, Oracle, Microsoft, OneLogin and more to get a better understanding of which vendor is right for your organization.
Posted: 24 Jul 2018 | Published: 18 Jun 2018

TOPICS: 
OneLogin

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

TOPICS: 
HID Global

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

TOPICS: 
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement