IT Management  >   Systems Operations  >   Security  >   AAA  >  

Remote Authentication

RSS Feed   
Remote Authentication Reports
 
Overcoming the Challenges of Managing ID Card Issuance
sponsored by HID Global
RESOURCE: ID card issuance is a complex task. You must ensure the security of data, manage locally-installed software and keep track of printer supply levels. On legacy systems, these processes are only made more difficult. The good news? There’s an innovative ID card issuance program to help you overcome these challenges. Open this infographic for details.
Posted: 01 Sep 2020 | Published: 31 Jul 2020

HID Global

Privileged Access Management, Single Sign-On & Enterprise Password Managers
sponsored by Keeper Security Inc
EBOOK: When it comes to establishing effective identity and access management (IAM) practices, organizations can typically go 1 of 3 directions: Privileged access management (PAM), single sign-on (SSO) or enterprise password management. Read on for an analysis of each and discover how to choose the right IAM solution for your business.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

NetMotion: Uncompromised Secure Access
sponsored by NetMotion
VIDEO: Workers are now working from everywhere, and VPNs are no longer able to provide ample protection in our increasingly mobile world. You need complete visibility into what’s happening on all your devices, no matter where they are. Where can you get it? Take a pause to watch this short video examining NetMotion’s SDP.
Posted: 11 Jan 2021 | Premiered: 11 Jan 2021

NetMotion

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Digital transformation has emerged as a key driver to cloud migration – in fact, 83% of workloads are expected to be cloud-based by the end of the year. Securing your data as you migrate it to the cloud is essential. Read this article to learn more about common cloud migration challenges and how to protect your data in transition.
Posted: 10 Dec 2020 | Published: 28 Oct 2020

Atakama

Okta Video 1: NetMotion + Okta Integration Webinar
sponsored by Okta
WEBCAST: Okta’s Identity Cloud range of products are known for adaptive multi-factor authentication (MFA) and single sign-on (SSO). NetMotion’s mobile-centric platform, a VPN and a software-defined perimeter (SDP), is built on a zero-trust architecture. Watch this webinar to learn how they integrate to help you keep your remote workforce secure.
Posted: 10 Mar 2021 | Premiered: Mar 10, 2021

Okta

Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi ID
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi ID

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences