IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed   
User Authentication Reports
 
How to Detect The 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Onfido

Remote Work Considerations: Securing the New Corporate Network
sponsored by EvolveIP
WHITE PAPER: Today’s environments have embraced SaaS offerings, realizing scalability and cost benefits. However, each additional SaaS provider adds another disparate system to the environment, potentially exposing security vulnerabilities. In this white paper, explore key considerations your security team should make when enabling remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Identity Governance for Workday
sponsored by SailPoint Technologies
VIDEO: In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

TOP 5 REASONS TO PRIORITIZE PRIVILEGED ACCESS MANAGEMENT
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach today. However, ensuring that privileged access is secure is easier said than done. In this white paper, learn about the top 5 reasons your organization should prioritize PAM-as-a-Service.
Posted: 18 Aug 2020 | Published: 20 Jun 2020

CyberArk Software, Inc

Identity Proofing
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: Today’s customers and end users demand fast, secure digital interactions from the organizations they do business with. This white paper highlights the key features and capabilities of Entrust Datacard’s ID Proofing offering, designed to provide fast, accurate and fully digital identity proofing. Read on to learn more.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

Entrust, Inc.

SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise
sponsored by SailPoint Technologies
TECHNICAL ARTICLE: The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

SailPoint Technologies

Frost & Sullivan Best Practices Award
sponsored by Onfido
WHITE PAPER: The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Onfido

A Step-by-Step Guide: Achieving Zero Standing Privilege
sponsored by Remediant
WHITE PAPER: Privileged access management has changed how organizations keep users in check, but as it turns out, it is not enough. 74% of breached organizations admitted that the breach was made through a privileged account. The issue is standing access. Learn about the benefits of zero standing privilege in this step-by-step guide.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Solution Brief: Best Practices for Secure Mobile Access
sponsored by SonicWall
PRODUCT OVERVIEW: As organizations shift towards digital workspaces, ensuring the protection of mobile devices becomes increasingly critical. The following solution brief provides a comprehensive set of best practices and practical steps to ensure your organization protects its mobile devices against modern threats.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

DTEX and the Insider Threat Kill Chain
sponsored by Dtex
EBOOK: With insider threats, you must ask yourself, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’. Preventing these attacks requires visibility and intelligence. Read this e-book for 5 steps to insider attack prevention.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

Dtex
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info