IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed   
User ID Management Reports
 
Zero Trust Identity and Access Management Webinar
sponsored by Centrify Corporation
WEBCAST: How does your enterprise plan to improve identity security? Tune into this on-demand webinar to uncover how a zero trust concepts can be applied to enhance IAM.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

Centrify Corporation

Simplifying Fraud Analytics
sponsored by SAS
WHITE PAPER: According to SAS, as losses continue to grow, detecting and preventing fraud is consistently ranked among the top three investment and strategic priorities for insurance executives. Explore this resource to uncover 10 steps to detecting and preventing insurance fraud.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

CW Europe – December 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 07 Dec 2017 | Published: 14 Dec 2017

ComputerWeekly.com

The Future is Decentralized
sponsored by HYPR
WHITE PAPER: According to the Verizon DBIR, 80% of hacking related breaches are the result of weak or stolen passwords. But large scale data breaches are avoidable. This white paper details why decentralized authentication is the way forward for enterprises wanting to solve this critical security challenge.
Posted: 01 Mar 2018 | Published: 01 Mar 2018

HYPR

Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015

Axiomatics

A Buyer's Guide to Online Identity Verification
sponsored by Jumio
WHITE PAPER: Because of cybercriminals and routine data breaches, trust is in increasingly short supply. This resource reveals how to evaluate vendors in the emerging trusted identity as a service space.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Jumio

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Thycotic

The Right Way to Prove Identity and Establish Trust
sponsored by One Identity
RESOURCE: Passwords provide assurance of identity, but they can be easily compromised. This resource reveals a strategy to proving the identity of individuals in a transaction or exchange of personal information.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement