IT Management  >   Systems Operations  >   Security  >   AAA  >  

Remote Authentication

RSS Feed   
Remote Authentication Reports
 
Blockchain Applications for Identity Verification
sponsored by Evident
WHITE PAPER: Blockchain applications are constantly evolving and show promise for the identity world. Read on to explore 3 specific identity verification applications of digital ledger technology and where they align in the security world.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

Evident

Magic Quadrant for Access Management, Worldwide
sponsored by OneLogin
RESEARCH CONTENT: Uncover this market evaluation of leading access management providers such as, IBM, Oracle, Microsoft, OneLogin and more to get a better understanding of which vendor is right for your organization.
Posted: 24 Jul 2018 | Published: 18 Jun 2018

OneLogin

Top 5 Ways to Relieve the Pain of Managing Hybrid AD Environments
sponsored by One Identity
WHITE PAPER: According to One Identity, nearly 90% of organizations worldwide are using Active Directory (AD) for on-premises resources. This e-book addresses 5 challenges that organizations must overcome as they navigate the transition to a hybrid AD implementation.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which, can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Strengthen Your Identity Security
sponsored by F5 Networks
EBOOK: This e-book acknowledges today's challenges with identity and access management and explores the capabilities and potential benefits for Active Directory Federation Services (AD FS) and Office 365.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

F5 Networks

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 02 Aug 2018 | Published: 31 Oct 2016

IBM

Identity-Led Security and Strong Authentication
sponsored by Okta
VIDEO: Join this webinar to learn why identity isn't simply just a "first step" and what characteristics a strong authentication should include.
Posted: 17 Jul 2018 | Premiered: 16 Jul 2018

Okta

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 30 Jul 2018 | Published: 21 Feb 2018

IBM

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement