IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed   
User Authentication Reports
 
Curity AB Video
sponsored by Curity AB
VIDEO: Client Initiated Backchannel Authentication (CIBA) is a new authentication flow that allows organizations to authenticate their users without having to directly interact with them. Watch this webinar to learn more about CIBA and its common use cases.
Posted: 28 Jun 2021 | Premiered: 28 Jun 2021

TOPICS:  Authentication
Curity AB

The Ultimate Guide to Securing Today’s Remote Workforce
sponsored by ForgeRock
EBOOK: The Ultimate Guide to Securing Today's Remote Workforce leverages exclusive insight from Gartner and TechTarget to provide you with a better understanding of the operational and cybersecurity challenges and opportunities that were introduced as a result of the need to enable remote workforces. Take this survey to access this e-guide.
Posted: 12 May 2021 | Published: 12 May 2021

TOPICS:  Authentication
ForgeRock

Aruba ESP With Zero Trust Security: Security for the Edge
sponsored by Aruba Networks
DATA SHEET: In this brief, learn how Aruba ESP with Zero Trust Security can help improve an organization’s overall network security posture by applying a more rigorous set of security best practices and controls to previously trusted network resources.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Aruba Networks

SSO in the Cloud and Mobile Era
sponsored by Techtarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Techtarget

SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise
sponsored by SailPoint Technologies
TECHNICAL ARTICLE: The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

SailPoint Technologies

SOLUTION BRIEF: BEST PRACTICES FOR SECURE MOBILE ACCESS
sponsored by SonicWall
PRODUCT OVERVIEW: As organizations shift towards digital workspaces, ensuring the protection of mobile devices becomes increasingly critical. The following solution brief provides a comprehensive set of best practices and practical steps to ensure your organization protects its mobile devices against modern threats.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi ID
WHITE PAPER: The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020

Hitachi ID

Report, Zero Trust: What You Need to Know to Secure Your Data and Networks
sponsored by Gigamon
ANALYST REPORT: Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it’s time to rethink strategy. As Gigamon’s new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security.
Posted: 15 Sep 2020 | Published: 31 Mar 2020

Gigamon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences