dcsimg

Drew Robb - Article Archives - Page 1

20 Top UEBA Vendors

June 4, 2019
User and entity behavior analytics uses machine learning to protect against insider threats and external attacks. We review the top UEBA products.
READ MORE

9 Top Network Access Control (NAC) Solutions

May 7, 2019
Network access control is critical for controlling the security of devices that attach to your network. Here are nine NAC solutions to consider.
READ MORE

FortiNAC: Network Access Product Overview and Insight

May 7, 2019
Fortinet's network access control (NAC) solution supports 30,000 ports per server and offers real-time automated threat response.
READ MORE

10 Top Single Sign-On Solutions

April 24, 2019
Single sign-on solutions can make access management easier for security teams, and the most sophisticated can adapt as risks change. Here are 10 of the best.
READ MORE

IBM Authentication Solutions: Single Sign-On Overview and Analysis

April 24, 2019
We review IBM's single sign-on solutions, the on-premises IBM Security Access Manager (ISAM) and the Cloud Identity IDaaS offering.
READ MORE

ForgeRock Identity Platform: Single Sign-On Overview and Analysis

April 24, 2019
We review the ForgeRock Identity Platform, which provides single sign-on (SSO) capabilities as well as other identity and access management features.
READ MORE

Okta Identity Cloud: Single Sign-On Overview and Analysis

April 24, 2019
We review Okta Identity Cloud, an identification-as-a-service offering used by more than 4,000 organizations.
READ MORE

Micro Focus Access Manager: Single Sign-On Overview and Analysis

April 24, 2019
We review Micro Focus Access Manager, a single sign-on solution available as an appliance, software or cloud-based service.
READ MORE

OneLogin Unified Access Management Platform: Overview and Analysis

April 24, 2019
We review OneLogin Unified Access Management Platform, which scales from less than 10 users to more than 100,000.
READ MORE

CA Single Sign-On: Product Overview and Analysis

April 24, 2019
We review CA Single Sign-On, which can scale to handle more than 80 million users and 3 billion transactions per month.
READ MORE

Oracle Enterprise Single Sign-On: Product Overview and Analysis

April 24, 2019
We review Oracle's two single sign-on solutions, Identity Cloud Service and Access Management, which are used by some of the largest companies in the world.
READ MORE

Ping Identity: Single Sign-On Overview and Analysis

April 24, 2019
We review Ping Identity, which provides single sign-on capabilities to some of the largest companies in the world.
READ MORE

Idaptive Application Services: Single Sign-On Overview and Analysis

April 24, 2019
We review Idaptive Application Services, which offers single-sign on capabilities as part of its Zero Trust Security approach.
READ MORE

Microsoft Azure Active Directory: Single Sign-On Overview and Analysis

April 24, 2019
We review Microsoft Azure Active Directory, an affordable, cloud-based single sign-on solution used by companies of all sizes.
READ MORE

How to Manage a Security Operations Center

April 10, 2019
We define security operations centers (SOCs), including how they should be designed, run and staffed, and the technologies needed to make them work.
READ MORE

What Is Single Sign-On, and How Can It Make Your Enterprise More Secure?

March 15, 2019
We define single sign-on and how SSO solutions can be implemented to make your organization more secure.
READ MORE

DevSecOps: How to Build Security into Apps

March 13, 2019
We define DevSecOps, how it relates to DevOps, and how security can be built into the development process with minimal disruption.
READ MORE

9 Top Database Security Tools

February 27, 2019
Databases contain some of the most critical data in an organization. Here are 9 top database security tools to help you protect that data.
READ MORE

Always Encrypted: Database Security Product Overview and Analysis

February 27, 2019
We review Always Encrypted, a free database security tool included with Microsoft SQL Server.
READ MORE