Filter by:

white-papers

5 Best Practices for Auditing Privileged User Activity

Read our five best practices for ensuring your organization is prepared to take on the privileged user activity auditing process and handle issues as they arise.

01/21/2021

white-papers

Privileged Access Management Best Practices

Managing privileged access reduces your risks of a cyberattack. But to do so effectively, you need to follow privileged access management best practices.

01/20/2021

white-papers

Identity Lifecycle Governance with SailPoint and Zscaler

SailPoint's integration with Zscaler provides Zero Trust identity management and enables enterprises to holistically govern and mange user access. Learn more.

01/19/2021

white-papers

Privileged Access Management Use Cases

Privileged access management provides enhanced security and compliance. Here are some common privileged access management use cases and why they’re important.

01/19/2021

white-papers

What is Attribute-Based Access Control?

Attribute-based access control (ABAC) is an authentication and authorization model that uses attributes, rather than roles, to grant user access. Learn more.

01/19/2021

white-papers

Privileged Access Management Security Risks

Check out our compilation of common privileged access risks that affect account and enterprise integrity to help you plan for and safeguard against them.

01/15/2021

white-papers

8 Benefits of Privileged Access Management

With PAM, organizations can ensure those who need privileged access get it while protecting critical business systems. Here are eight benefits of PAM.

01/14/2021

white-papers

Identity Access Management (IAM) vs. Privileged Access Management (PAM)

IAM and PAM are important to the overall identity strategy. An understanding of both are critical to organizational success and regulatory compliance.

01/14/2021

white-papers

The Future of Identity and Access Management

As IT environments, workplace demands and compliance requirements change, identity management trends must evolve to keep up with new security risks. Learn more.

01/13/2021

white-papers

An Overview of Mobile Identity Management

How do you enable secure adoption of mobile technologies while managing risk? Your mobile identity management strategy must be part of a unified IAM program.

01/13/2021