IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 656 Matches Previous Page  |  Next Page
Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations
sponsored by Okta
WEBCAST: For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.
Posted: 27 Mar 2020 | Premiered: Jul 31, 2018

Okta

Digital Resilience in the Multi-Cloud Era
sponsored by Trustwave
EBOOK: Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Trustwave

SafeNet Trusted Access: Cloud-based Access Management as a Service
sponsored by Thales
PRODUCT OVERVIEW: While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.
Posted: 27 Mar 2020 | Published: 31 May 2019

Thales

Securing data across the enterprise while simplifying IT operations
sponsored by Thales
WHITE PAPER: The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.
Posted: 27 Mar 2020 | Published: 31 Aug 2019

Thales

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage

Rethinking API Security
sponsored by Okta
VIDEO: APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Okta

Unlocking Omni-Channel with Unified Customer Identity
sponsored by Okta
WHITE PAPER: To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Okta

Encrypt Everything
sponsored by Thales
EBOOK: Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security. Read on to learn more.
Posted: 26 Mar 2020 | Published: 30 Nov 2019

Thales

Thales Data Protection on Demand
sponsored by Thales
CASE STUDY: In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Thales

Keeping Up with Data Security Compliance in the Age of Data Privacy Laws
sponsored by InteliSecure
WHITE PAPER: As more and more data privacy regulations come into play, organizations are constantly tasked with reviewing and revising their security plan to adhere to these laws. This white paper dives deeper into achieving data security in the era of GDPR, CCPA and other legislations. Read on to learn more.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

InteliSecure

Alero Intro
sponsored by CyberArk Software, Inc
VIDEO: In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.
Posted: 25 Mar 2020 | Premiered: 25 Mar 2020

CyberArk Software, Inc

Customer Identity & Access Management (CIAM)
sponsored by Ping Identity Corporation
WHITE PAPER: Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Ping Identity Corporation

CyberArk Privilege Cloud Whiteboard Video
sponsored by Cyber-Ark Software
VIDEO: Organizations are shifting from traditional perimeter security tools to focusing on controlling and managing access, allowing for remote workers and third parties to securely interact in their network. In this whiteboard video, discover the value of privileged access management programs delivered as SaaS.
Posted: 25 Mar 2020 | Premiered: 25 Mar 2020

Cyber-Ark Software

The CipherTrust Cloud Key Manager for Multicloud Environments
sponsored by Thales
PRODUCT OVERVIEW: Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.
Posted: 25 Mar 2020 | Published: 28 Feb 2018

Thales

Three Cybersecurity Challenges Every Enterprise Needs to Address
sponsored by Trustwave
RESOURCE: As organizations continue to adopt transformative technologies, they must be careful to place equal importance on the security of their network and its data. This infographic highlights the 3 key cybersecurity challenges organizations need to address. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Trustwave

Secure Access to On-prem Apps & Hybrid Cloud Security
sponsored by Okta
DATA SHEET: In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Okta

CA SiteMinder Migration Guide
sponsored by Okta
WHITE PAPER: To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.
Posted: 24 Mar 2020 | Published: 30 Sep 2019

Okta

Alero Demo
sponsored by CyberArk Software, Inc
VIDEO: As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

CyberArk Provides Free Subscription to Alero
sponsored by Cyber-Ark Software
RESOURCE: The emergence of COVID-19 has caused sweeping environmental changes amongst organizations doing their part to stop the spread, enabling more employees to work remotely than ever before. To help ease the transition, CyberArk is planning to offer its secure remote access platform at no cost through May. Read on to learn more.
Posted: 24 Mar 2020 | Published: 18 Mar 2020

Cyber-Ark Software

Alero Showcase
sponsored by CyberArk Software, Inc
VIDEO: In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

How to Recognize and Resist Common Email Cons
sponsored by Trustwave
RESOURCE: The frequency and success of phishing attacks is increasing at an alarming rate. Just when organizations believe they understand how to spot an attempt, hackers come up with new ways to infect inboxes. This infographic outlines how to spot a phishing attack by looking at emerging tactics and how to spot them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

Protecting a Nation in the Cloud
sponsored by Trustwave
CASE STUDY: In this case study, see how a major government sub-agency partnered with Trustwave to address challenges they were having with securing sensitive data across multiple cloud vendors. Read on to follow the journey of their partnership.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

Upgrading Existing Security Systems to Agile Quantum-Safe
sponsored by Thales
PRODUCT OVERVIEW: Since the National Security Agency (NSA) issued a warning against quantum computer attacks in 2015, organizations have begun to revisit their protection strategies in order to account for this growing threat. This solution brief highlights 3 challenges in today’s landscape and recommends tools for addressing them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Thales

The 2020 Study on Staffing the IT Security Function in the Age of Automation
sponsored by DomainTools
WHITE PAPER: Automation is growing in popularity amongst IT security teams – offloading certain tasks in order to reduce workload and enhance productivity. In this report, discover the results of a Ponemon Institute study into the relationship between IT security staffing and automation.
Posted: 24 Mar 2020 | Published: 29 Feb 2020

DomainTools

Remote Vendor Access
sponsored by CyberArk Software, Inc
WHITE PAPER: Today’s organizations are heavily reliant on third-party vendors accessing their critical infrastructures. However, this presents an attractive target for hackers. In this white paper, discover how the CyberArk Alero architecture could help you achieve security without the need for VPNs or passwords. Read on to learn more.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc
1 - 25 of 656 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info