IM (Identity Management) Reports

Magic Quadrant for Privileged Access Management
sponsored by CyberArk
GARTNER MAGIC QUADRANT: CyberArk has been named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management.  CyberArk Privileged Access Management secures privileged credentials and secrets wherever they exist: on-premises, in the cloud, and anywhere in between, like an invisible force field protecting your organization's most critical assets.
Posted: 27 Feb 2024 | Published: 27 Feb 2024

CyberArk

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2021

TechTarget ComputerWeekly.com

Information Security magazine Insider Edition, April 2017
sponsored by TechTarget Security
EZINE: Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools.
Posted: 19 Apr 2017 | Published: 10 Apr 2017

TechTarget Security

The Digital Certificate: How It Works, Which to Buy
sponsored by TechTarget Security
EBOOK: If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017

TechTarget Security

Digital Identities: Account Creation & Blockchain Implications
sponsored by Beta Systems
EGUIDE: Digital identities have become a critical aspect of modern digital business. However, ensuring each account is secure and has access to appropriate data and applications can be complicated. Read this e-guide to learn about digital identity account creation and the potential impacts of disruptive technologies, like Blockchain.
Posted: 02 Aug 2022 | Published: 02 Aug 2022

Beta Systems

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

What are Threat Intelligence Services?
sponsored by Unisys
EGUIDE: To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.
Posted: 13 Oct 2016 | Published: 12 Oct 2016

Unisys

The Right Tools Smooth the DevOps Transition
sponsored by Splunk
EGUIDE: Before your DevOps team jumps on board with AWS, you need a full array of tools from either AWS or third parties. This e-guide covers how to avoid errors in releasing code in AWS, how to select the right combination of AWS and third party tools for your business needs, and more.
Posted: 16 May 2017 | Published: 12 May 2017

Splunk