IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed   
User Authentication Reports
 
New Tech: Early Adopters Find Smart 'Zero Trust' Access Improves Security Without Stifling Innovation
sponsored by PortSys
RESOURCE: Abused logon credentials continue to fuel the never-ending escalation of cyberattacks. However, the Zero Trust approach could be well on its way to changing this. In this blog, uncover key findings from a recent discussion Byron Acohido of The Last Watchdog, had with PortSys' CEO Michael Oldham about Zero Trust.
Posted: 27 Sep 2019 | Published: 22 Jul 2019

PortSys

Transform the Customer Experience with a Modern Customer IAM Solution
sponsored by Okta
WHITE PAPER: Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Now Tech: Authentication Management Solutions, Q3 2018
sponsored by IBM
WHITE PAPER: Organizations use authentication management to simplify processes, reduce operational costs and enhance customer experience by minimizing friction. But selecting a vendor can be overwhelming.In this Forrester report, explore the features of 26 diverse providers in order to help you find a vendor that meets your organizational needs.
Posted: 12 Nov 2019 | Published: 07 Aug 2018

IBM

Discover your Single Sign-On (SSO) and Multi-factor Authentication Security Options
sponsored by TeamViewer
RESOURCE: In this blog post, learn how an identity management platform can help save time for employees, as well as help them understand the importance of creating strong passwords and two-factor authentication.
Posted: 24 Apr 2019 | Published: 24 Apr 2019

TeamViewer

Independent Study Pinpoints Significant SCADA/ICS Security Risks
sponsored by Fortinet, Inc.
ANALYST REPORT: Many organizations beyond electric and water utilities have deployed SCADA/ICS as they look to automate their data collection and their equipment. However, the technologies have become high-value targets for hackers. In this research report, explore common SCADA and ICS threats and find recommendations for mitigating the risks they pose.
Posted: 09 Aug 2019 | Published: 16 Apr 2019

Fortinet, Inc.

The Evolution and Application of Identity Proofing
sponsored by Evident
WHITE PAPER: Technology advancements have changed the landscape of identity proofing, challenging organizations to digitally verify that an individual is who they say they are online. But many businesses are resultant to implement identity proofing. In this white paper, learn why identity proofing is key to avoid risks associated with identity theft.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Evident

BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

CyberArk Privilege Cloud Whiteboard Video
sponsored by CyberArk Software, Inc
VIDEO: CyberArk Privilege Cloud can help your organization discover and manage privileged credentials on-premises, in the cloud, and hybrid environments. In this video, Andrew Silberman from CyberArk discusses the benefits of CyberArk Privilege Cloud and helps you evaluate if it is a good fit for your organization.
Posted: 24 Oct 2019 | Premiered: 24 Oct 2019

CyberArk Software, Inc

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence
sponsored by Cyber-Ark Software
WHITE PAPER: The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement