Latest
Keepit Secures USD 50M in its Latest Funding Round
Arctic Wolf Acquires Cylance of BlackBerry for USD 160M
Sublime Security Nabs USD 60 M for its Platform and Community
Ayar Labs Raises $155M to Transform AI Workloads with Light
Citrix Acquires Strong Network and DeviceTRUST for Zero-trust Security
Vaultree Open-sourced its Data Encryption Technology Elements
AWS is Widening its Cybersecurity Portfolio to Combat Breaching
N-able Acquires Adlumin to Expand Cybersecurity Portfolio
Halcyon Secures USD 100 M to Combat Ransomware
Wiz Acquires Dazz, a Cybersecurity Startup for a Whopping USD 450 M
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
2024 state of application strategy report...
datos – api security solution evaluation guide...
challenges in application security (and why your o...
ai pcs are quickly becoming the key to achieving s...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
the vancouver canucks score a cybersecurity hat tr...
cyber insurance and cyber defenses 2024: lessons f...
how to run a cybersecurity tabletop exercise...
unpatched vulnerabilities: the most brutal ransomw...
du rôle du stockage pour relever les défis de la...
il ruolo dello storage per garantire la resilienza...
state of the european security and privacy markets...
ランサムウェア対策の 7 つのベスト�...
cyber snapshot, issue 7 - five hot topics in cyber...
veeam's ai security: zero trust demos...
api 보안 ebook...
All
Security
how to reduce the risk of ransomware? a detailed g...
data tokenization transforming protection and comp...
customer identity access management: build trust ...
application protection management in a digital era...
continuous data protection strengthening business ...
cloud encryption fortifies digital frontier for en...
grid computing harness distributed resources for s...
enhancing cyber resilience: a strategic approach t...
advanced encryption standard: pillar for modern da...
secure sensitive data with privileged access manag...
modernizing secops in enterprises: a comprehensive...
explore 5 tactics to enhance innovation at the edg...
advanced api security: why gateways alone aren't e...
intrusion detection system: the cornerstone of net...
single-vendor sase: key use cases to consider befo...
why are targeted ransomware attacks so successful?...
why threat hunting cyber security is today’s nee...
dynamic application security testing for technical...
critical role of virtual firewall in optimizing en...
secure voice communications: safeguarding your con...
All
Security
keepit secures usd 50m in its latest funding round...
arctic wolf acquires cylance of blackberry for usd...
sublime security nabs usd 60 m for its platform an...
ayar labs raises $155m to transform ai workloads w...
citrix acquires strong network and devicetrust for...
vaultree open-sourced its data encryption technolo...
aws is widening its cybersecurity portfolio to com...
n-able acquires adlumin to expand cybersecurity po...
halcyon secures usd 100 m to combat ransomware...
wiz acquires dazz, a cybersecurity startup for a w...
hp launches enterprise security edition to boost b...
bitsight acquires cybersixgill in a usd 115 m deal...
zscaler launches zero trust segmentation to boost ...
fortinet launches fortiai integrations to expand a...
permiso releases a suite of three open-source tool...
fortanix and versasec partner to strengthen crypto...
crowdstrike to acquire adaptive shield, a cloud se...
ransomware gang breaches schneider electric and de...
google uncovers susceptibility using ai to be worl...
armis raises usd 200 m round at usd 4.2b valuation...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Whitepapers
Identity and Access Management
Identity and Access Management Whitepapers
Leveraging Identity Data in Cyber Attack Detection and Response
Sponsored by:
Okta
Published By:
Research Desk
Released:
Feb 02, 2021
As organizations break away from traditional network-based security concepts, where zones are delegated “trusted” or “untrusted,” to people-centric security models like Zero Trust, identity is...
Read more
The Identity of Things Explained
Sponsored by:
OpenText
Published By:
Research Desk
Released:
Nov 16, 2020
The Identity of Things (IDoT) extends traditional identity and access management (IAM) for the internet era. It identifies all IoT infrastructure components to ensure secure connectivity and data trus...
Read more
The State of Zero Trust Security in Global Organizations
Sponsored by:
Okta
Published By:
Research Desk
Released:
Sep 16, 2020
Modern Security for a Perimeter-less World There’s no denying that, among information security watchers, zero trust has gone well beyond buzzword status. The oft-discussed security framework, ori...
Read more
ForgeRock Identity As A Service (IDaaS) How A Comprehensive IDaaS Solution Can Meet The Ch...
Sponsored by:
Forgerock
Published By:
Research Desk
Released:
Aug 26, 2020
Read the How a Comprehensive Identity As-A-Service Solution Can Meet the Challenges of Tomorrow Today white paper and learn: -Roadblocks to meeting identity and access management (IAM) requirements...
Read more
Mastering Identity and Access Management
Sponsored by:
Insight
Published By:
Research Desk
Released:
Aug 05, 2020
Developing a comprehensive Identity and Access Management (IAM) program is one of the best things you can do to secure and support a dispersed workforce. Discover expert recommendations for reviewing ...
Read more
The Guide to Modern Identity:
Sponsored by:
LastPass
Published By:
Research Desk
Released:
Apr 28, 2020
How can your organization maximize security and productivity with Identity and Access Management (IAM) solutions? LastPass commissioned the market research firm, Vanson Bourne, to offer insights in...
Read more
The Future of Identity and Access Management
Sponsored by:
ForgeRock
Published By:
Research Desk
Released:
Dec 05, 2019
Identity and Access Management (IAM) is bound to be increasingly an integral part of our personal and business lives as the technological and societal landscape continues to rapidly change. Although w...
Read more
Future-Ready Identity and Access Management
Sponsored by:
One Identity
Published By:
Research Desk
Released:
Feb 12, 2019
This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user ac...
Read more
Identity And Access Management For The Real World: The Fundamentals
Sponsored by:
One Identity
Published By:
Research Desk
Released:
Nov 14, 2018
This short e-book Identity and Access Management for the Real World evaluates what IAM for the real world would, should and can look like, including best practices. It delves into the most pressing id...
Read more
Whitepapers
News
Insights
Security
Security
Security
We use cookies to ensure we give you the best experience on our website. We strongly encourage you to read our updated
Privacy Policy
Agree