IT Management  >   Systems Operations  >   Security  >   AAA  >  

User ID

RSS Feed   
User ID Reports
 
Securing Hospitality IT Infrastructure
sponsored by CyberArk Software, Inc
WHITE PAPER: When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.
Posted: 26 Aug 2019 | Published: 30 Apr 2019

CyberArk Software, Inc

Magic Quadrant for Access Management, Worldwide
sponsored by OneLogin
RESEARCH CONTENT: Uncover this market evaluation of leading access management providers such as, IBM, Oracle, Microsoft, OneLogin and more to get a better understanding of which vendor is right for your organization.
Posted: 24 Jul 2018 | Published: 18 Jun 2018

OneLogin

Making the Business Case for Zero Trust Access
sponsored by PortSys
RESOURCE: Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.
Posted: 27 Sep 2019 | Published: 07 Jun 2019

PortSys

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

Supporting Business Agility in a Connected World
sponsored by HID Global
WHITE PAPER: In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

HID Global

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID Global
PRODUCT OVERVIEW: Organizations that want to secure access to their premises, applications and networks run into significant challenges. Unfortunately, the technology to address those issues can sometimes require products from up to 12 different vendors. Download this product overview to learn about HID PIV and how it can address all those challenges.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

HID Global

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

OneLogin

Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization
sponsored by FairWarning
EBOOK: 1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this ebook, explore 5 of these profiles and learn how to protect your organization from each.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

FairWarning

The Future of Identity and Access Management Tools
sponsored by Jumio
EGUIDE: Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement