password management

Results 1 - 25 of 61Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration, software security, storage backup
    
Citrix ShareFile
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content, emerging marketing, marketing research
    
bigtincan
Published By: Bitium     Published Date: Jan 22, 2014
Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
Bitium
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam
    
F5 Networks Inc
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, business intelligence
    
Bitium
Published By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation, organizational data, customize reports, cuztomize dashboards, data fields, scriptlogic, quest software, itil, service levels, proactive event management
    
Dell Software
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.