IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed   
User Authentication Reports
 
A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Microsegmentation: The First Step to Zero-Trust Security
sponsored by ColorTokens
RESOURCE: Modern security will see the elimination of adding network layer after network layer to fix security vulnerabilities. Businesses need a tighter security method, one that allows them to control traffic within and between segments. This is the basis of microsegmentation. Read this article to learn why microsegmentation is the way forward.
Posted: 06 Oct 2020 | Published: 23 Mar 2020

ColorTokens

Real Estate Company Secures Cloud Access with Thales’s SafeNet Trusted Access
sponsored by Thales
CASE STUDY: Securing remote user access to cloud networks and applications is critical – But if efficiency and productivity are lost during the process, then what’s the point? In this case study, see how a real estate developer was able to secure cloud access for their remote workforces through a partnership with Thales.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Thales

Key Tenets of Zero Trust Architecture
sponsored by ColorTokens
RESOURCE: Zero-trust architecture (ZTA) is a security blueprint built on the premise that attackers are already present and that anything can be compromised at any point. Broadly speaking, the tenets of ZTA can be classified under three security domains. Read this short article alongside the NIST SP 800-207 to examine the vital roles of these tenets.
Posted: 30 Sep 2020 | Published: 04 Sep 2020

ColorTokens

Definitive Guide to Zero-Trust Security
sponsored by ColorTokens
EBOOK: Upon first hearing the term zero-trust, it can feel a bit worrying to implement what sounds like a “never trust” security policy. But what it actually provides is “just enough trust” to authorized users while blocking out all other traffic. To learn more, dive into the Definitive Guide to Zero-Trust Security to understand how zero trust works.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

ColorTokens

What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER: This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019

Beta Systems

Top Trends in Customer Identity and Access Management (CIAM) with analyst Mary Ruddy
sponsored by Okta
WEBCAST: Customer identity has gone mainstream. A seamless customer experience across devices is now expected. At the same time, security and privacy concerns are at an all-time high. View this webinar to hear from Gartner analyst Mary Ruddy and learn about findings from her recent research "Top 5 Trends in CIAM Solution Design".
Posted: 30 Sep 2020 | Premiered: Sep 30, 2020

Okta

Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

Managing Identity So You Can Scale
sponsored by Okta
WHITE PAPER: Today’s users expect an experience that is not only frictionless and personalized, but also secure. To meet this demand, organizations are turning to customer identity and access management (CIAM) tools. Read this white paper to learn more about Okta’s CIAM offering and how it’s benefitted some of their key partners.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Okta

Two-Factor Authentication is Broken: What Comes Next?
sponsored by BIO-key International
EGUIDE: The philosophy behind two-factor or multi-factor authentication (2FA/MFA) has been to authenticate a device rather than an identity. For many reasons, this loose ‘identity approximation’ method will not hold up in the long run. To learn more, study our expert guide Two-Factor Authentication is Broken: What Comes Next?
Posted: 12 Nov 2020 | Published: 29 Oct 2020

BIO-key International
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info