IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed   
Web Access Control Reports
 
Banyan Security Zero Trust Remote Access Video
sponsored by Banyan Security
VIDEO: In this video, learn about a singular Zero Trust remote access platform that delivers dynamic trust scoring, continuous authorization and granular access enforcement.
Posted: 02 Dec 2019 | Premiered: 02 Dec 2019

Banyan Security

Supporting NERC CIP Compliance
sponsored by Claroty
WHITE PAPER: Electric industry asset owners are subject to mandatory cybersecurity regulations known as the NERC CIP standards. In this white paper, learn how Claroty's fully integrated platform supports entities' compliance efforts while helping to improve the cybersecurity and operational reliability of power generation and transmission systems.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

PortSys

Supporting Business Agility in a Connected World
sponsored by HID Global
WHITE PAPER: In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

HID Global

The 2019 Zero Trust Privilege Maturity Model Report
sponsored by Centrify Corporation
ANALYST REPORT: To provide context around the current state of Zero Trust Privilege, Centrify surveyed 1,300 information security professionals. Download this 2019 report to learn more about the Zero Trust Privilege Maturity Model and discover key findings from the survey.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

Total Access in a Zero Trust Environment
sponsored by PortSys
RESEARCH CONTENT: With the rate at which technology is changing, traditional security models are growing ineffective at providing adequate protection. Organizations require a scalable approach that is effective for securing on-premise and remote users. In this article, take a closer look at the increasingly popular zero-trust model for total access control.
Posted: 29 Jan 2020 | Published: 23 Jan 2020

PortSys

Securing the workplace of the future
sponsored by Tehama
EBOOK: A stolen or compromised identity is at the heart of many of the major data breaches you read about in the news. With virtual access becoming the norm, ensuring protection for a borderless workplace is critical to maintaining a secure environment. In this white paper, explore 3 key best practices for securing your digital workforce.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tehama

A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info