5 Critical Security Callouts to Know in 2024
sponsored by Cisco
INFOGRAPHIC:
Cisco conducted a survey and compiled the results in their 2024 Duo Trusted Access Report, which evaluates the new frontier for access management and identity security. Gain an understanding of the top 5 most important takeaways from the report in this infographic.
Posted: 09 May 2024 | Published: 09 May 2024
|
|
|
Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024
|
|
|
CW APAC October 2023 – Buyer’s guide to IAM
sponsored by TechTarget ComputerWeekly.com
EZINE:
Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
Posted: 19 Oct 2023 | Published: 19 Oct 2023
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
A Computer Weekly e-Guide to IAM
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 08 Feb 2021 | Published: 10 Dec 2020
|
|
|
Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER:
Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE:
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009
|
|
|
Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT:
Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009
|
|
|
Presentation Transcript: Accelerating Return-On-Investment with Roles Management
sponsored by Oracle Corporation
PRESENTATION TRANSCRIPT:
This paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations.
Posted: 12 Feb 2009 | Published: 12 Feb 2009
|
|
|
HP Virtual Desktop Infrastructure with Citrix XenDesktop
sponsored by Citrix and HP
WHITE PAPER:
The HP and Citrix solution offers you the functionality of a stand-alone desktop, while enabling unified management of both physical and virtual infrastructures from the same centralized console.
Posted: 07 Jan 2009 | Published: 07 Jan 2009
|
|
|
The "Hard Truths" About Managing Administrative and Application Identities
sponsored by CyberArk Software, Inc
VIDEOCAST:
This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)
|
|
|
Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE:
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008
|
|
|
Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER:
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007
|
|
|
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER:
SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007
|
|
|
On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck
sponsored by Dell Software
WEBCAST:
Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
Posted: 24 Jul 2007 | Premiered: Jul 24, 2007
|
|
|
A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER:
This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007
|
|
|
Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System
sponsored by Forescout Technologies, Inc.
WHITE PAPER:
Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.
Posted: 23 Mar 2007 | Published: 01 Jan 2006
|
|
|
Network Access Protection: New Ways to Keep Your Network Healthy
sponsored by Global Knowledge
WHITE PAPER:
Learn how Network Access Protection (NAP) operates to isolate non-compliant or infected computers from the network until corrective measures can be taken.
Posted: 06 Jan 2007 | Published: 01 Jan 2007
|
|
|
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER:
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006
|
|
|
Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE:
ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006
|
|