IT Management  >   Systems Operations  >   Security  >   AAA  >  

Remote Authentication

RSS Feed   
Remote Authentication Reports
 
Privacy: Data Protection and Identity Management
sponsored by Micro Focus
WEBCAST: To help enterprises meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. In this webcast, Nathan Turajski, Director of Product Marketing at Micro Focus provides an overview of their Data Protection and Identity Management solution.
Posted: 10 Jul 2019 | Premiered: Feb 28, 2019

Micro Focus

Automation First: A Practical Approach to IAM
sponsored by Hitachi ID
WHITE PAPER: This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

Can Cryptography Save Our Elections
sponsored by RSA Conference
RESOURCE: Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.
Posted: 26 Jul 2019 | Published: 23 May 2019

RSA Conference

Avoid Authentication Anarchy: How to Choose your Authenticator
sponsored by HID Global
RESOURCE: Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

HID Global

A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

Scaling Identity Management to Ensure Customer Loyalty Program Success: Four Case Studies
sponsored by Akamai Technologies
CASE STUDY: To successfully grow their loyalty programs and initiatives, leading enterprises are turning to customer identity and access management (CIAM) solutions. In this white paper, learn about the CIAM challenges associated with customer loyalty programs. Also, discover how to address these challenges based on 4 real-world case studies.
Posted: 13 Sep 2019 | Published: 30 Apr 2019

Akamai Technologies

How to Keep up with the Shifting Landscape of Password Attacks
sponsored by Zoho
WHITE PAPER: Hackers are evolving, and apart from implementing technology to help avoid cyberthreats, personal awareness plays a big role in defending against the mechanisms cybercriminals use to steal credentials. In this white paper, explore password theft methods used by hackers, and learn how simple tweaks can reduce the risk of a password compromise.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Zoho

Securing Hospitality IT Infrastructure
sponsored by CyberArk Software, Inc
WHITE PAPER: When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.
Posted: 26 Aug 2019 | Published: 30 Apr 2019

CyberArk Software, Inc

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement