IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed   
User Provisioning Reports
 
Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

5 Ways to Boost Agility by Transforming Workforce Identity
sponsored by Ping Identity Corporation
RESOURCE: Workforce identity management enables security teams to monitor and control which users and devices have access to specific areas of data. In this article, discover how this approach to data management can help organizations boost agility and enhance security.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Ping Identity Corporation

Ultimate Guide to Customer IAM
sponsored by Ping Identity Corporation
EBOOK: Understanding the opportunities that CIAM brings, how it’s different than enterprise IAM and how to choose and implement a CIAM solution may seem like a daunting task. This guide will put you on the right path to selecting the best CIAM solution for your enterprise.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Ping Identity Corporation

SailPoint Identity is Security
sponsored by SailPoint Technologies
VIDEO: Each year, we face worse and more frequent data breaches than the last. Security methods that have worked for years are becoming ineffective against modern attacks. Watch this video and discover how identity management may be able to help address modern threats targeting people.
Posted: 16 Mar 2020 | Premiered: 16 Mar 2020

SailPoint Technologies

SASE Series, Part 2: The Security View
sponsored by Hughes Network Systems
WHITE PAPER: A term coined by Gartner, Secure Access Service Edge (SASE) is an approach to network security designed to be the successor to data centers as organizations shift their data and endpoints to the cloud. In this blog post, dive deeper into the SASE approach, the growing attack surface, and its relationship with zero trust.
Posted: 07 May 2020 | Published: 30 Apr 2020

Hughes Network Systems

Duo for Device Trust
sponsored by Duo Security
PRODUCT OVERVIEW: As organizations continue to enable employees to work remotely and interact within their own devices, mobile security becomes an increasingly critical piece of the security strategy. In this solution brief discover how Duo’s zero trust approach offering can help organizations meet their security and compliance goals.
Posted: 06 May 2020 | Published: 06 May 2020

Duo Security

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Data Security with Okta and Netskope
sponsored by Okta + Netspoke
RESOURCE: As organizations continue to embrace the productivity and cost benefits of cloud capabilities, it’s now more important than ever the make sure the right security checks are in place to secure sensitive data. Read this blog post to discover the common points of failure, explore what a CASB is (and how it can help), and more.
Posted: 27 May 2020 | Published: 18 Jul 2018

Okta + Netspoke

Zero Trust Evaluation Guide for the Workforce
sponsored by Duo Security
WHITE PAPER: To meet the scalability and security needs of today’s distributed business environments, organizations are adopting a zero-trust approach to manage access to sensitive data. In this white paper, take a look at the process of establishing secure trusted access from your users and their devices to work applications.
Posted: 04 May 2020 | Published: 04 May 2020

Duo Security

Remote Vendor Access
sponsored by CyberArk Software, Inc
WHITE PAPER: Today’s organizations are heavily reliant on third-party vendors accessing their critical infrastructures. However, this presents an attractive target for hackers. In this white paper, discover how the CyberArk Alero architecture could help you achieve security without the need for VPNs or passwords. Read on to learn more.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info