IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed   
User ID Management Reports
 
Retiring Web Access Management (WAM)
sponsored by Okta
DATA SHEET: Many organizations have adopted web access management (WAM) solutions to secure access to web applications on-premises. But with the emergence of SaaS, mobile apps and IaaS, enabling access to all systems and users has broken the WAM security model. Take a look at this data sheet to learn how to modernize identity management.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta

Infographic: The Maturity Of Zero Trust In Europe.
sponsored by Okta
RESOURCE: Zero Trust is driving European organizations to enhance their security. In an Okta poll, 93% of said organizations say they’ve implemented at least one security solution mapped to a zero-trust strategy. For more data on how your peers are adopting zero trust to protect their apps, download this infographic exhibiting European zero-trust trends.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Okta

Hitachi ID Bravura Security Fabric
sponsored by Hitachi ID
DATA SHEET: Security teams are beginning to implement what are known as ‘fabrics’ in their stacks for a more across-the-board approach to security responsibilities. What benefits can implementing a fabric have when it comes to identity? Take a look at this data sheet to learn about Hitachi’s ID Bravura Security Fabric for digital identity management.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

Hitachi ID

Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ComputerWeekly.com

To Register And Verify A Customer’S Identity
sponsored by Onfido
CASE STUDY: Sidehide is a service offering users a seamless hotel booking and check-in experience; “one-click hotels”, as they call it. They’d faced an issue: Manually verifying the identity of the person checking in took a lot of time, but it had to be done for compliance. View this case study to learn how Sidehide shortened the process to just one minute.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Onfido

How To Secure Your Vpn – And Then Rethink It Entirely
sponsored by Okta
RESOURCE: For years, VPNs have allowed employees to securely access apps, databases and email systems outside of the corporate network. But as companies enable distributed work from everywhere, VPNs are being reconsidered. Download this infographic to learn how a 4-stage approach to zero-trust security can help you phase out your VPN.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Okta

Blackberry Cyber Video
sponsored by BlackBerry
VIDEO: According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.
Posted: 30 Dec 2020 | Premiered: 30 Dec 2020

BlackBerry

Identity Security: Why It Matters And Why Now
sponsored by CyberArk Software, Inc
EBOOK: Inside this e-book, follow an attacker to understand why identity is the new battleground and consider the challenges that come with protecting identities.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

CyberArk Software, Inc

A RISK-BASED APPROACH TO INSIDER THREAT DETECTION FOR FEDERAL GOVERNMENT AGENCIES
sponsored by Merlin International
WHITE PAPER: Malicious insiders, regardless of motive, continue to establish themselves as a major threat, especially amongst United States federal government agencies. This white paper offers comprehensive insights into the role of privileged access management as an effective countermeasure against insider threats – read on to get started.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

Burdens of Homegrown Customer Identity that Hinder Digital Transformation
sponsored by Okta
WHITE PAPER: When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences