IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed   
User Authentication Reports
 
Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

Kubernetes Open-Source Orchestration & Security
sponsored by Aqua Security
RESOURCE: For those who use the open-source capabilities of Kubernetes security, there are 4 types of threats that you should know about. In this resource, explore a discussion of threat models, various security considerations and best practices for optimizing your Kubernetes deployment.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Aqua Security

SmartKey Security Overview
sponsored by Equinix
RESOURCE: Learn how your enterprise can protect its most sensitive data in any cloud environment.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Equinix

Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

Simple and Smart Security for the Enterprise Cloud
sponsored by MobileIron
RESOURCE: Download this resource to learn about a new security framework that allows your organization to confidently adopt mobile-cloud technologies while reducing the risk of data breaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

MobileIron

Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Protect Legacy Applications without Touching Your Apps with Okta and Palo Alto Networks
sponsored by Okta
VIDEO: Find out the latest trends in credential-based attacks and why every sensitive cloud application needs multi-factor authentication.
Posted: 17 Jul 2018 | Premiered: 31 Oct 2017

Okta

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control.
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement