IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed   
User Provisioning Reports
 
Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

Frost & Sullivan Best Practices Award
sponsored by Onfido
WHITE PAPER: The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Onfido

Workforce authentication authority: What is it and what are the benefits?
sponsored by Ping Identity Corporation
RESOURCE: Read this white paper to gain a deeper understanding of the benefits of a workforce authentication authority, its essential capabilities, and the use cases it can support.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

TOPICS:  Access Control
Ping Identity Corporation

SailPoint Identity Hub: Search, Track & Manage Access
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Cybersecurity Risk: A Board’s-Eye View Chapter 3
sponsored by PortSys
EBOOK: The zero trust market is becoming saturated, and organizations considering zero trust are having to do their homework when it comes to vendor selection and fit. For many, substantial factors will be ease of deployment and flexibility, as these will lower costs. Read this short brief to learn about Zero Trust Access by PortSys.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Customer Identity and Access Management - Deciding Between Build vs Buy
sponsored by Akamai Technologies
WEBCAST: This webinar explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations.
Posted: 22 Jun 2020 | Premiered: Jun 22, 2020

Akamai Technologies

5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud
sponsored by Ionic Security
PRODUCT OVERVIEW: In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Ionic Security

Continuous Authentication as the Zero Trust Multiplier
sponsored by BlackBerry
RESOURCE: The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.
Posted: 10 Jul 2020 | Published: 14 May 2020

BlackBerry

SMBs Need Improved Defenses to Protect Remote Workers
sponsored by Citrix
WEBCAST: Regardless of the outcome of this pandemic, it’s beginning to look like remote work will continue for the foreseeable future – especially among SMBs. In this webinar, explore the increasing risks and opportunities as they relate to securing remote workforces at SMBs, and discover how Citrix’s zero trust platform can help.
Posted: 28 Aug 2020 | Premiered: Aug 28, 2020

Citrix

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in an offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info