IT Management  >   Systems Operations  >   Security  >   AAA  >  

User ID

RSS Feed   
User ID Reports
 
Forrester Report: A Practical Guide to a Zero-Trust Implementation
sponsored by Okta
ANALYST REPORT: Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don’t know how to implement it, or they feel daunted by the shifts in strategy and architecture that Zero Trust demands. Read this Forrester report to learn the building blocks of a successful Zero-Trust implementation roadmap.
Posted: 26 Jun 2020 | Published: 15 Jan 2020

Okta

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Blueprint: Modern Layered Security
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Secure Access to Virtual Environments and Private Clouds
sponsored by Thales
PRODUCT OVERVIEW: As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.
Posted: 13 Jul 2020 | Published: 30 Jun 2020

Thales

Zero Trust Is an Initial Step on the Roadmap to CARTA
sponsored by Guardicore
ANALYST REPORT: Gartner’s strategic approach zero-trust, known as CARTA, is a concept for network security where access and trust are initially limited, then continuously assessed throughout the interaction between user and network. Read this article to discover what defines CARTA strategy and how it relates to zero-trust.
Posted: 03 Jan 2020 | Published: 10 Dec 2018

Guardicore

Privileged Account Management for Dummies
sponsored by IBM
EBOOK: In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Rethinking API Security
sponsored by Okta
VIDEO: APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Okta

Zero Trust 101: Building the Right Strategy
sponsored by TechTarget
RESOURCE: Organizations are adopting the zero-trust networking mindset in order to offset modern threats and address current cybersecurity challenges. To help get you started, our expert guide, The Complete Zero Trust Handbook, defines the zero-trust model and offers guidance to help you get started. To receive your free copy, contribute to
Posted: 11 Aug 2020 | Published: 11 Aug 2020

TechTarget

5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud
sponsored by Ionic Security
PRODUCT OVERVIEW: In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Ionic Security

SailPoint Identity Now: Certification Creation
sponsored by SailPoint Technologies
VIDEO: Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.
Posted: 28 Jul 2020 | Premiered: 28 Jul 2020

SailPoint Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info