User Authentication Reports

Implementing a Zero-Trust Approach to Network Security
sponsored by TechTarget
RESOURCE: Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 04 Oct 2021 | Published: 04 Feb 2020

TechTarget

The Total Economic Impact™ Of Palo Alto Networks Prisma SASE
sponsored by Palo Alto Networks
FORRESTER TOTAL ECONOMIC IMPACT REPORT: Forrester does the heavy lifting for you in this Total Economic Impact report, analyzing the benefits, cost, and financial impact of Palo Alto Networks Prisma SASE from a third-party, neutral perspective. Access the report to view Forrester’s analysis.
Posted: 03 May 2024 | Published: 03 May 2024

Palo Alto Networks

Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019

TechTarget

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID Global

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

TWO-FACTOR AUTHENTICATION OPTIONS, USE CASES AND BEST PRACTICES
sponsored by Celestix Networks
EGUIDE: This expert e-guide is a pivotal resource to understand how to best use two-factor authentication security options. Single-factor password-based authentication systems are doomed to fail, so read on with the experts to learn the best practices to protect your business.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Celestix Networks

Information Security Magazine: August Issue
sponsored by TechTarget Security
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

TechTarget Security

Moving Beyond Ad Hoc Mobile Security
sponsored by TechTarget Security
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

TechTarget Security