IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed   
User ID Management Reports
 
The Journey to IAM Success
sponsored by One Identity
WHITE PAPER: IAM is becoming a valuable enabler but, planning and deploying IAM is not without its challenges. In this white paper, discover first-hand opinions, lessons learnt and recommendations from senior peers in several global brands who have experienced the trials and triumphs of implementing their own IAM programs.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

One Identity

There Are Two Types Of Companies Today: Those that Have Had Security Breaches, And Those That Don't Know they Have.
sponsored by Lenovo & Microsoft
RESOURCE: The number of cyberattacks is rising every day and criminals are constantly developing more sophisticated and creative ways to expose vulnerabilities. Every device is at risk, and companies must rely on technology providers to "out-innovate" the bad guys. In this infographic and Q&A, explore Lenovo's end-to-end security offerings.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Lenovo & Microsoft

Closing the Cloud Security Gap
sponsored by West IP Communications
WHITE PAPER: According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

West IP Communications

How Blockchain Transforms Data Security
sponsored by ALTR
WHITE PAPER: The blockchain design pattern is not just about supporting digital currencies or rethinking every human system of trust. Its basic security-related characteristics have the potential to stem today's overwhelming tide of data breaches. In this white paper, learn more about blockchain and how it can help your organization protect sensitive data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

ALTR

Are Your Network Users Over-Privileged?
sponsored by Cyxtera
RESOURCE: Find out how to improve privileged access management with tips on how to enforce a zero-trust model that's purpose-built for the software-defined network perimeter.
Posted: 04 Dec 2018 | Published: 17 Sep 2018

Cyxtera

Context-Aware Security Provides Next-Generation Protection
sponsored by Citrix
RESOURCE: Cybersecurity is among the most important board-level issues for nearly every organization. In this article, learn more about next-generation security strategies. These strategies are driven by personalized cyberdefenses based on what each user typically does and what information and application each user regularly works with.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

Citrix

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Onfido

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Moving from Simple Authentication to Identity Assurance
sponsored by RSA
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

RSA

When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016

Unisys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement