IT Management  >   Systems Operations  >   Security  >   AAA  >  

User ID

RSS Feed   
User ID Reports
 
Simplifying Fraud Analytics
sponsored by SAS
WHITE PAPER: According to SAS, as losses continue to grow, detecting and preventing fraud is consistently ranked among the top three investment and strategic priorities for insurance executives. Explore this resource to uncover 10 steps to detecting and preventing insurance fraud.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Considerations When Choosing the Best Strong Authentication Approach
sponsored by HID Global
WHITE PAPER: Discover the variables that should be considered when choosing the best authentication solution for your organization.
Posted: 14 May 2018 | Published: 14 May 2018

HID Global

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

The Rising Threat of Account Takeover
sponsored by SpyCloud
RESOURCE: Password security is vital in all aspects of an enterprise and stolen credentials are no joke. Find out how you can help protect your business from a damaged reputation and future data breaches.
Posted: 11 Jul 2018 | Published: 31 Oct 2017

SpyCloud

IAM as a Foundation for Your AWS Migration Strategy
sponsored by Identity Automation
WHITE PAPER: Using IAM as the foundation of your AWS migration can reduce complexity, smooth out the overall process, and help ensure a successful transition to the cloud. This white paper offers strategies for enhancing your AWS deployment with an IAM approach.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

How to Minimize the IAM Risks Associated with Third-Party Relationships
sponsored by Identity Automation
EBOOK: With 63% of breaches resulting from weak, default, or stolen passwords, it's clear that single-factor authentication isn't enough to secure data. Locking down third-party accounts with privileged access management is more urgent than ever. Discover a variety of ways to increase your IAM approach to mitigate the risks of third-party relationships.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Identity Automation

Phishing Has Never Been Easier
sponsored by Cylance
RESOURCE: Open this resource to learn how to address phishing with domain-based message authentication, reporting and conformance (DMARC), an email authentication system policy and reporting protocol.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Cylance

10 Steps to Cleaning up Active Directory User Accounts
sponsored by One Identity
WHITE PAPER: Active Directory (AD) is the foundation of IAM at most organizations and as a result, is one of the most crucial technologies on the network. This resource offers 10 steps to remediate user account problems in AD and to prevent them from occurring in the future.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

The Breach Prevention Playbook: Simple Ways to Get IAM Right and Protect Your Organization
sponsored by One Identity
RESOURCE: Explore the IAM practices and technologies that provide the best path to cybersecurity that can bolster your chances of surviving and enable your organization to emerge with minimal damage.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

Police Department Locks Down Remote Access
sponsored by One Identity
CASE STUDY: Explore this case study to gain insight into how a police department increased security of mobile computing devices as well as met compliance with federal requirements to provide secure remote access.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement