IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed   
Web Access Control Reports
 
Duo Security's Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
WHITE PAPER: As passwords grow increasingly ineffective, new ways of authenticating users and managing identities are needed to ensure the protection of sensitive data. In this evaluation guide, learn the criteria for customizing your evaluation process and discover how to assess the efficacy of a two-factor authentication tool.
Posted: 01 May 2020 | Published: 01 May 2020

Duo Security

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

Work from Home: An Application and Identity Management Guide
sponsored by EvolveIP
WHITE PAPER: Identity and access management (IAM) has enabled IT professionals to maintain security at scale, allowing organizations to continue their digital transformations. In this white paper, take a closer look into the methods and facets that make up IAM, as well as how to integrate remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Multi-Factor Authentication for Customers
sponsored by Ping Identity Corporation
WHITE PAPER: Today’s customers are aware of the need for additional security measures and expect organizations to provide. To address the increasing ineffectiveness of passwords, security teams are beginning to embrace customer multi-factor authentication (MFA). Read this white paper to discover the benefits and how it differs from employee MFA.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation

Alero Demo
sponsored by CyberArk Software, Inc
VIDEO: As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

Hybrid IT-OT Security Management
sponsored by Skybox Security
WHITE PAPER: OT and IT environments have historically been managed and secured separately to focus on the unique vulnerabilities that plague each environment. However, a unified approach that combines IT and OT environments positions organizations to identify and combat threats most effectively. Read on to learn more about this hybrid approach.
Posted: 22 Apr 2020 | Published: 07 Apr 2020

Skybox Security

Ultimate Guide to Customer IAM
sponsored by Ping Identity Corporation
EBOOK: Understanding the opportunities that CIAM brings, how it’s different than enterprise IAM and how to choose and implement a CIAM solution may seem like a daunting task. This guide will put you on the right path to selecting the best CIAM solution for your enterprise.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Ping Identity Corporation

Zero-Trust in Practice
sponsored by Gigamon
WEBCAST: In reality, a Zero Trust architecture goes beyond “trust no one” and “build micro-perimeters around your data”, and requires organizations define their own framework, policies and practices. As a result, no two Zero Trust implementations are alike. Download this webcast to learn more.
Posted: 28 Apr 2020 | Premiered: Apr 28, 2020

Gigamon

How to Know It’s Time to Change Your Identity Vendor
sponsored by SailPoint Technologies
WHITE PAPER: Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

SailPoint Technologies

Building Cloud Services for Security: 3 Common Misconfigurations
sponsored by DivvyCloud
WHITE PAPER: Ensuring the secure configuration of a distributed set of cloud services is a critical piece to cloud transformation. In fact, most risk areas related to cloud come from security misconfigurations. This white paper highlights 3 common misconfigurations and explores ways to fix them or prevent them from happening.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info