IT Management  >   Systems Operations  >   Security  >   AAA  >  

User ID

RSS Feed   
User ID Reports
 
A Guide To Fraud In The Real World
sponsored by Splunk
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

Customer Identity and Access Management: A WSO2 Reference Architecture
sponsored by WSO2, Inc.
WHITE PAPER: Customers expect some control around how firms collect, store, manage, and share their profile data. Customer Identity and Access Management (CIAM) addresses these requirements by authenticating, authorizing, collecting and storing information about consumers across many domains. In this white paper, learn everything you need to know about CIAM.
Posted: 09 Aug 2019 | Published: 31 Jul 2019

WSO2, Inc.

Case Study: Columbia County Sheriff
sponsored by HID Global
CASE STUDY: The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.
Posted: 10 Apr 2019 | Published: 19 Jan 2018

HID Global

Who Watches the Watchers?
sponsored by Forcepoint
VIDEO: Tune into this webcast as, Forcepoint Chief Scientist, Dr. Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it.
Posted: 11 Jun 2019 | Premiered: 11 Jun 2019

Forcepoint

Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization
sponsored by FairWarning
WHITE PAPER: 1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this white paper, explore 5 of these profiles and learn how to protect your organization from each.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

FairWarning

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID Global
PRODUCT OVERVIEW: Organizations that want to secure access to their premises, applications and networks run into significant challenges. Unfortunately, the technology to address those issues can sometimes require products from up to 12 different vendors. Download this product overview to learn about HID PIV and how it can address all those challenges.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

HID Global

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement