Identity Management and Access Control Reports

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Case Study: Globalscape® WAFS Expands the Panama Canal
sponsored by Globalscape
CASE STUDY: This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
Posted: 27 May 2014 | Published: 31 Dec 2013

Globalscape

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Identity and Access Management Tools to Look Out For
sponsored by Okta
ESSENTIAL GUIDE: Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.
Posted: 05 Apr 2019 | Published: 01 Apr 2019

Okta

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Citrix XenMobile and Cisco ISE Integration
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Cisco Systems, Inc and Citrix