User ID Management

User ID Management Reports
CW Nordics May 2017
sponsored by ComputerWeekly.com
EZINE: The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
Posted: 18 May 2017 | Published: 25 May 2017

ComputerWeekly.com

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Oct 2019

ComputerWeekly.com

Mitigating Data Breach Risk with Identity Governance for Files
sponsored by SailPoint Technologies
RESOURCE: Read this brief to learn why the best way to prevent extraneous risk and mitigate how much data is exposed during a breach is to comprehensively secure access to all users, applications, and data stored in files.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

How Okta Integrates Applications: An Architectural Overview
sponsored by Okta
DATA SHEET: In this product overview, discover how Okta uniquely enables SSO into any web or mobile application using open standards, or proprietary APIs, or Secure Web Authentication (SWA) and by SAML-enabling on-prem web applications.
Posted: 21 Jun 2021 | Published: 09 Dec 2019

Okta

Surviving Beyond the New Normal: It's more than securing your remote workers
sponsored by Okta
WEBCAST: In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.
Posted: 08 Feb 2021 | Premiered: Jan 14, 2021

Okta

Going Beyond Access Management with Identity Governance
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: Security continues to be a high priority for today’s security leaders, with 86% of CIOs expecting a spending increase – allowing them to refine and improve their identity and access management (IAM) practices. Read this solution brief to learn how to go beyond traditional IAM with identity governance.
Posted: 27 Oct 2021 | Published: 27 Oct 2021

SailPoint Technologies

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

ComputerWeekly.com

CW ASEAN November 2016
sponsored by SearchSecurity.com
EZINE: Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

Integrating IAM into your Digital Workspace
sponsored by Citrix
EGUIDE: Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
Posted: 30 May 2018 | Published: 24 May 2018

Citrix

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity