IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed   
User ID Management Reports
 
Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in an offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant

Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters
sponsored by Tehama
WHITE PAPER: Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.
Posted: 27 Aug 2020 | Published: 29 Feb 2020

Tehama

Microsoft Office 365 Security, SASE, and Zero Trust
sponsored by InteliSecure
EBOOK: Along with the latest security innovation from Microsoft - Office 365 Security - businesses are considering a SASE platform and zero trust architecture to further push their networks to the edge of security. With these developments, IT professionals are asking, ‘Why is this better than what we have in place?’ View this e-book to learn the answer.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

InteliSecure

Privileged Account Management for Dummies
sponsored by IBM
EBOOK: In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

The Impact of COVID-19 On IT and Cybersecurity
sponsored by IBM
WHITE PAPER: What changes were necessary to address the unexpected global pandemic? What types of cybersecurity challenges did the transition present? How are organizations doing? For answers to these questions, read this survey, conducted by ESG, to gain a perspective on the cybersecurity impact of COVID-19 as well as implications for the future.
Posted: 26 Aug 2020 | Published: 29 Jul 2020

IBM

PortSys: Zero Trust e-book
sponsored by PortSys
EBOOK: Zero trust is gaining popularity due to its flexible approach to enterprise protection. According to the International Data Group, 52% of companies are researching or piloting a zero trust model. If you’re considering a model of your own, read these 5 security questions to learn where you stand, and to see where you could benefit from zero trust.
Posted: 25 Sep 2020 | Published: 01 Aug 2020

PortSys

Webinar: Multicloud Strategy. Process First. Technology Second.
sponsored by VMware & Rackspace Technology
WEBCAST: Amazon and Microsoft saw as much digital transformation in the last two months as they were expecting in the next two years. Businesses must understand how to leverage technology to keep up with rapid change. Watch this webinar to get an in-depth look at the future of business and technology and how industry and the world will be impacted.
Posted: 25 Aug 2020 | Premiered: Jul 31, 2020

VMware & Rackspace Technology

4-step Work From Home Guide
sponsored by HCL Software
WHITE PAPER: When a crisis manifests, organizations need to respond quickly or risk insolvency. CISOs and security teams must continue to protect sensitive data while teleworking, and IT and security operations must work together to patch and remediate vulnerabilities. Read this BigFix white paper to learn the 4 core capabilities to support secure telework.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

HCL Software

Maintain Business Continuity with Aruba's Remote Access Solutions
sponsored by Aruba Networks
DATA SHEET: More people than ever before are now working remotely. But everyone still needs secure, reliable access to systems and applications, no matter where they are. How do you open up your network and still keep data secure? In this brief, learn how Aruba’s remote access solutions can help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Aruba Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info