Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 1899 Matches Previous Page  |  Next Page
Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations
sponsored by Okta
WEBCAST: For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.
Posted: 27 Mar 2020 | Premiered: Jul 31, 2018

Okta

Digital Resilience in the Multi-Cloud Era
sponsored by Trustwave
EBOOK: Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Trustwave

Your Guide to Threat Intelligence, AI & Incident Response
sponsored by Dell SecureWorks
EGUIDE: Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Dell SecureWorks

Trusted Digital Signatures for Documents
sponsored by GlobalSign
DATA SHEET: GlobalSign offers a range of digital signature technology options, from desktop to the cloud and throughout the enterprise, enabling businesses of all sizes to optimize document workflows and meet compliance. Download this data sheet to learn more.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

GlobalSign

SafeNet Trusted Access: Cloud-based Access Management as a Service
sponsored by Thales
PRODUCT OVERVIEW: While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.
Posted: 27 Mar 2020 | Published: 31 May 2019

Thales

Securing data across the enterprise while simplifying IT operations
sponsored by Thales
WHITE PAPER: The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.
Posted: 27 Mar 2020 | Published: 31 Aug 2019

Thales

Rethinking API Security
sponsored by Okta
VIDEO: APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Okta

Reference Huddle: How Pitney Bowes Solves Business Challenges with Okta
sponsored by Okta
WEBCAST: In this group reference call, Okta speaks with Kenn Bryant, Director of Architecture and SaaS Services at Pitney Bowes, about how they use Okta's APIs to deliver an unmatched customer experience, enable the company to leverage the cloud, and make critical business data more accessible to customers, employees, and partners.
Posted: 26 Mar 2020 | Premiered: Mar 26, 2020

Okta

Encrypt Everything
sponsored by Thales
EBOOK: Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security. Read on to learn more.
Posted: 26 Mar 2020 | Published: 30 Nov 2019

Thales

Thales Data Protection on Demand
sponsored by Thales
CASE STUDY: In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Thales

Mobile Access Optimization and Security for the Cloud Era
sponsored by Cato Networks
EBOOK: Mobile and the cloud are the new normal for today's business. But traditional access solutions are poor choices when mobile users "live" in AWS, Office 365, and the rest of the cloud. This whitepaper will explain the pros and cons of the three ways mobile users can securely access the cloud: direct access, legacy VPN, and cloud SD-WAN.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Cato Networks

Keeping Up with Data Security Compliance in the Age of Data Privacy Laws
sponsored by InteliSecure
WHITE PAPER: As more and more data privacy regulations come into play, organizations are constantly tasked with reviewing and revising their security plan to adhere to these laws. This white paper dives deeper into achieving data security in the era of GDPR, CCPA and other legislations. Read on to learn more.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

InteliSecure

Customer Identity & Access Management (CIAM)
sponsored by Ping Identity Corporation
WHITE PAPER: Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Ping Identity Corporation

A Guide to Verifying Users in Financial Services
sponsored by Vonage
WHITE PAPER: Learn how banks and fintech companies can securely onboard customers at global scale with phone verification.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Vonage

Bring Secure, Frictionless Customer Experiences to Market Faster with Modern CIAM
sponsored by Okta
WHITE PAPER: To meet the security and privacy expectations of today’s customers, organizations need to put their customers’ identity front and center. A customer identity and access management (CIAM) solution can do just that. Learn how Okta Identity Cloud can help you address your IAM and CIAM concerns today and in the future.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Okta

The CipherTrust Cloud Key Manager for Multicloud Environments
sponsored by Thales
PRODUCT OVERVIEW: Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.
Posted: 25 Mar 2020 | Published: 28 Feb 2018

Thales

Three Cybersecurity Challenges Every Enterprise Needs to Address
sponsored by Trustwave
RESOURCE: As organizations continue to adopt transformative technologies, they must be careful to place equal importance on the security of their network and its data. This infographic highlights the 3 key cybersecurity challenges organizations need to address. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Trustwave

7 Steps to SSO + MFA to On-Prem Apps
sponsored by Okta
WEBCAST: Learn how to use Okta Access Gateway to control access to Hybrid IT and on-prem web applications, all without changing how your on-prem web apps work today.
Posted: 25 Mar 2020 | Premiered: Mar 25, 2020

Okta

The Top 7 Phone Verification Challenges & How to Overcome Them
sponsored by Vonage
WHITE PAPER: No consumer wants to be the victim of fraud or the recipient of unwelcome spam, and no app or service provider wants to unwittingly harbor spammers or fraudsters. In this e-book, learn how to increase conversion rates and onboard users at global scale with phone verification.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Vonage

A Guide to Verifying Users in E-Commerce
sponsored by Vonage
WHITE PAPER: In this guide, learn how to prevent fraud before it happens and protect buyers and sellers with phone verification with two-factor authentication.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Vonage

Secure Access to On-prem Apps & Hybrid Cloud Security
sponsored by Okta
DATA SHEET: In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Okta

GlobalSign Partner Program: Service Providers
sponsored by GlobalSign
DATA SHEET: Learn how to protect your data and secure your websites and email communications with GlobalSign.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

GlobalSign

The Changing Face of Data Security 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: No organization is immune from data security threats, with 49% of global respondents experiencing a data breach at some point. In this 2020 Thales Data Threat Report, learn why it’s important to implement a smarter approach to data security and review IDC’s research on the topic.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Thales

CyberArk Provides Free Subscription to Alero
sponsored by Cyber-Ark Software
RESOURCE: The emergence of COVID-19 has caused sweeping environmental changes amongst organizations doing their part to stop the spread, enabling more employees to work remotely than ever before. To help ease the transition, CyberArk is planning to offer its secure remote access platform at no cost through May. Read on to learn more.
Posted: 24 Mar 2020 | Published: 18 Mar 2020

Cyber-Ark Software

Meeting Compliance and Data Privacy Requirements
sponsored by Thales
EBOOK: Wherever you operate, Thales can help you improve your data security posture and become fit for compliance. View this e-book to learn more.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Thales
1 - 25 of 1899 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info