IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed   
Web Access Control Reports
 
Credential Stuffing Attacks Threaten Businesses in Asia-Pacific
sponsored by Akamai Technologies
RESOURCE: The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Akamai Technologies

Cloud Access Security Brokers: Top Vendors & Offerings
sponsored by McAfee
RESOURCE: The popularity of Cloud Access Security Brokers (CASBs) as an effective measure for cloud data protection is on the rise. In order to help you select the right vendor for your unique needs, Gartner conducted a comprehensive analysis of the top CASB vendors and offerings in today’s market – read on to unlock the Magic Quadrant report.
Posted: 11 Aug 2020 | Published: 05 Nov 2019

McAfee

Improving Online Customer Experience with Identity Management
sponsored by Okta
VIDEO: Does the adoption of identity and access management (IAM) affect organizations and users differently? In this video, join 2 distinguished security experts as they overview the affect that IAM can – and will – have on users across digital interactions.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

4-step Work From Home Guide
sponsored by HCL Software
WHITE PAPER: When a crisis manifests, organizations need to respond quickly or risk insolvency. CISOs and security teams must continue to protect sensitive data while teleworking, and IT and security operations must work together to patch and remediate vulnerabilities. Read this BigFix white paper to learn the 4 core capabilities to support secure telework.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

HCL Software

SailPoint Identity Now: Dashboard Overview
sponsored by SailPoint Technologies
VIDEO: In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

A Step-by-Step Guide: Achieving Zero Standing Privilege
sponsored by Remediant
WHITE PAPER: Privileged access management has changed how organizations keep users in check, but as it turns out, it is not enough. 74% of breached organizations admitted that the breach was made through a privileged account. The issue is standing access. Learn about the benefits of zero standing privilege in this step-by-step guide.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Identity Governance & Administration (IGA)
sponsored by SailPoint Technologies
WHITE PAPER: In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.
Posted: 04 Aug 2020 | Published: 30 Apr 2019

SailPoint Technologies

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys

Does Your MSP Provide Zero Trust Security?
sponsored by ThreatLocker
RESOURCE: Zero trust security has been discussed greatly in the current ecosystem of evolving threat patterns and the resulting heightened fear of security breaches. Movement away from a traditional ‘wall’ of security towards a multi-layered/faceted approach is the basis of what zero trust provides.Read this blog post on zero trust security to learn more.
Posted: 17 Jul 2020 | Published: 03 Jul 2020

ThreatLocker
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info