IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed   
User Authentication Reports
Omnichannel Authentication
sponsored by iovation, Inc.
RESOURCE: While the current banking experience is a multichannel approach, which provides fast access, it does not provide a secure, effortless user experience. This resource provides insight into omnichannel authentication within mobile banking to help provide customers a seamless, effortless, high-quality experience, while maintaining security.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

iovation, Inc.

Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER: One of the most important aspects of an IAM program is the securing, management and governance of privileged accounts. This resource uncovers strategies for successfully managing privileged accounts in order to improve your IAM approach.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

10 Steps to Cleaning up Active Directory User Accounts
sponsored by One Identity
WHITE PAPER: Active Directory (AD) is the foundation of IAM at most organizations and as a result, is one of the most crucial technologies on the network. This resource offers 10 steps to remediate user account problems in AD and to prevent them from occurring in the future.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

5 Signs You Need to Upgrade Your Legacy IA M System
sponsored by Identity Automation
WHITE PAPER: While 49% of business applications are now stored in the cloud, less than half of them are known or approved by the IT department, according to Ponemon Institute. This white paper reveals 5 signs you need to update your legacy identity and access management system.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

Why Externalize?
sponsored by Axiomatics
WHITE PAPER: This resource provides insight into the attribute based access control (ABAC) model, explores how it impacts authentication and application security, and reveals 4 common misconceptions.
Posted: 08 Feb 2018 | Published: 08 Feb 2018


Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
RESOURCE: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

How to Achieve End-to-End Authentication
sponsored by iovation, Inc.
WHITE PAPER: Examine how to overcome top authentication challenges by adapting to different levels of risk in real time. Uncover how you can use this method to respond to different risk scenarios.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

iovation, Inc.

How to Maintain Control of Documents and Files Shared with Others
sponsored by Citrix
VIDEO: Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018


Access Control is Easy
sponsored by One Identity
WHITE PAPER: Effective access control is a matter of well-managed groups. This resource uncovers how to implement and manage Active Directory (AD) groups and dives into why they are at the center of the access control and governance universe.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement