IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed   
User ID Management Reports
 
Cloud Guide to Achieving the Principle of Least Privilege
sponsored by Sonrai security
EBOOK: In this guide, read about Identity and Data Access management in the Public Cloud and what makes the management of priviledged identities so difficult.
Posted: 15 Jan 2021 | Published: 15 Jan 2021


Loyalty for Sale – Retail and Hospitality Fraud
sponsored by Akamai Technologies
ANALYST REPORT: The numbers speak for themselves: Retail, travel and hospitality all attracted a startling 63% of credential stuffing attacks and 41% of web attacks. In this new State of the Internet/Security report, Akamai goes beyond this data, taking you into the criminal marketplace that makes these industries and their loyalty programs such popular targets.
Posted: 04 Nov 2020 | Published: 30 Oct 2020

Akamai Technologies

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl

The 2020 Trust Report: eCommerce and Retail Executive Summary
sponsored by Synack
ANALYST REPORT: This 2020 Trust Report 1-Page Executive Summary allows you to quickly benchmark your organization’s security against others in eCommerce and Retail. You’ll also learn how organizations that adopt this one testing strategy harden their assets by 23%.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Synack

Vendor Portfolios for Secure Web Gateways
sponsored by Netskope
ANALYST REPORT: Vendors are expanding their core secure web gateways (SWG) to add more security features such as CASB, zero-trust network access, FWaaS and remote browser isolation. Download this Gartner Magic Quadrant to examine broader portfolios that may help you consolidate security vendors.
Posted: 13 Jan 2021 | Published: 08 Dec 2020

Netskope

IAM: Globalization & Large-Scale Enterprise
sponsored by IC Consult
WHITE PAPER: A growing number of workloads and IT services are moving to the cloud, and IAM is no exception. Moving IAM to the cloud helps avoid the integration, management and licensing complexity of hybrid IT environments (some workloads running on-prem, others in parallel in the cloud). Download this white paper to explore Identity-as-a-Service (IDaaS).
Posted: 12 Jan 2021 | Published: 12 May 2020

IC Consult

HID FARGO INK1000 Inkjet Card Printer & Encoder
sponsored by HID Global
VIDEO: In this short video, learn about the capabilities of the HID FARGO INK1000 Inkjet Card Printer & Encoder. It’s ideal for cost-conscious small- to medium-sized businesses and K-12 schools that need to print high-quality corporate and visitor badges, student and faculty IDs, or gift and loyalty cards.
Posted: 12 Nov 2020 | Premiered: 12 Nov 2020

HID Global

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Adapt to Long-Term Remote Work with Adaptive Access Policies
sponsored by Okta
VIDEO: Last year, organizations scrambled to enable their employees to work remotely – but how are organizations preparing for reality of a decentralized workforce for the long term? Watch this webinar to learn more about sustainable best practices for securing and enabling a remote workforce.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Okta

A Next-Generation Approach to KYC
sponsored by Socure
WHITE PAPER: While KYC has become an essential practice in the fight against financial crime, programs can often be burdensome and resource intensive. This whitepaper highlights 3 essential elements required for a safe, seamless and successful KYC program – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info