Access Authentication and Authorization Reports

Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 5 March 2024: Authorised access only – biometrics in the workplace
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now.
Posted: 04 Mar 2024 | Published: 05 Mar 2024

TechTarget ComputerWeekly.com

Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

Speed Up Your Business with E-Signatures
sponsored by Adobe EchoSign
WHITE PAPER: This white paper shows how IT departments can implement an e-signature solution that will cut down physical paperwork and increase efficiency.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM