Access Control Research
-
Computer Weekly – 8 October 2019: Showcasing the potential of 5G
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
-
4 Top Identity and Access Management Trends
Sponsored by: OnfidoAs end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
-
Who needs security orchestration, automation and response?
Sponsored by: TechTarget SecurityWho needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
-
Identity and Access Management Tools to Look Out For
Sponsored by: OktaTechnologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.
-
Authentication 101: What You Need to Know
Sponsored by: HYPRWhat does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
-
How the Cloud Access Security Broker Space Is Evolving
Sponsored by: Palerra Inc.The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
-
Defend your Organization with Advanced SIEM and Privileged Account Controls
Sponsored by: SplunkAs SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
-
DLP Tools Essential to Data Protection Strategy
Sponsored by: Intel SecurityNetwork-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
-
Five Critical Rules for Firewall Management: Lessons from the Field
Sponsored by: Dell SecureWorksThis white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
-
Locking up the Cloud with IAM
Sponsored by: TechTarget SecurityIn this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
-
Computer Weekly: Robots at Your Service
Sponsored by: TechTarget ComputerWeekly.comMany digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
-
Your Role in AWS Security
Sponsored by: TechTarget Search AWSThis handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
-
Prevent Fraud and Improve the User Experience with Mobile Access Management
Sponsored by: IBMThis white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
-
Aligning your Enterprise Identity and Access Management Strategy
Sponsored by: DLT SolutionsThis expert e-guide covers how you can align identity and access management with CIO and business priorities.
-
Identity and Access Management (IAM) in the Cloud
Sponsored by: DLT SolutionsThis expert e-guide explores the growing market for cloud-based identity and access management.
-
Mobile Security Best Practices in a Healthcare Setting
Sponsored by: InsightThis expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
Sponsored by: IBMFind out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
ActivID® Authentication Appliance for Enterprise
Sponsored by: HID GlobalIn this brochure, discover a solution that puts an end to your identity and authentication worries.
-
Identity Management Tech Brief
Sponsored by: Red HatRead this whitepaper to learn more about domain controllers with Linux for better identity and access management.
-
Respect User Privacy While Securing the Cloud and Mobile Devices
Sponsored by: BitGlassThis white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.