IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Privileges

RSS Feed   
Privileges Reports
 
Creating an Identity-Aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

Fortinet Delivers a Flexible SASE Solution
sponsored by Fortinet, Inc.
WHITE PAPER: Networks have been fundamentally transformed by digital innovation, cloud adoption, and the recent widespread shift to remote work. Increased reliance on cloud resources and environments has necessitated a new approach to secure network access. Jump into this white paper for an up-close look at SASE, which can support dynamic secure access needs.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Fortinet, Inc.

Twitter Phone Spear Phishing Attack
sponsored by Lookout
WHITE PAPER: On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

Lookout

Businesses at Work (from Home) 2020 Edition
sponsored by Okta
ANALYST REPORT: Organization around the world have reacted to the pandemic quickly, rolling out remote communication apps, extending VPNs, and adding MFA to ensure the productivity, connectivity, and security of their (now) remote workforces. In this report, 2020 Business at Work (from Home), take a closer look at the fastest growing apps and tools.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by SearchSecurity.com
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

October Essentials Guide on Mobile Device Security
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
Posted: 10 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Digital identities and the open business
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

ComputerWeekly.com

4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info