IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed   
User Authentication Reports
 
Solving the Password Problem in the Technology Industry
sponsored by OneLogin
WHITE PAPER: Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

OneLogin

General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation
sponsored by HID Global
WHITE PAPER: As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.
Posted: 04 Feb 2019 | Published: 31 Dec 2018

Dell SecureWorks

Scaling Identity Management to Ensure Customer Loyalty Program Success
sponsored by Akamai Technologies
CASE STUDY: In this white paper, find 4 real-world case studies, where leading enterprises across the globe are deploying Akamai Identity Cloud to grow and transform their customer loyalty programs and other membership initiatives.
Posted: 08 May 2019 | Published: 08 May 2019

Akamai Technologies

5 Steps For A Successful IAM Deployment
sponsored by Optiv
WHITE PAPER: Identity Access Management (IAM) is a complex and ever-shifting aspect of every organization's IT structure. Because of this complex nature, deploying an IAM program can be difficult. A successful deployment is often even harder to achieve. In this white paper, explore 5 steps to ensure your IAM deployment is successful.
Posted: 30 May 2019 | Published: 30 May 2019

Optiv

A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

What Hackers Know That You Don't
sponsored by Evident
WHITE PAPER: Companies such as LinkedIn, Uber and Equifax have all been victims of significant data hacks. In this white paper, uncover some basics of how breaches happen and where data travels when they do, as well as how you can strengthen security protocols to prevent breaches in the future.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

Episode 2: The Attack
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Be Shielded From Every Angle in the Battle for Cybersecurity
sponsored by Lenovo and Intel
RESOURCE: Cybersecurity threats are all around you. It is important to shield against these threats from every angle. ThinkShield by Lenovo offers a comprehensive suite of end-to-end security offerings, with cutting-edge innovation that keep you safe.
Posted: 25 Jan 2019 | Published: 16 Oct 2018

Lenovo and Intel

Simplify and Secure all Privileged Access with Agentless MFA
sponsored by Silverfort
PRODUCT OVERVIEW: With all privileged accounts and assets centrally managed by the CyberArk Privileged Access Security solution, it's critical to ensure that only authorized users can access and utilize them. Download this solution brief to learn about the benefits of Silverfort and CyberArk integration today.
Posted: 21 May 2019 | Published: 21 May 2019

Silverfort
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement