REGISTER

CCTNacl default Download

PingOne Risk Management is a cloud-based service that leverages machine learning and intelligent, configurable policies to secure authentication by evaluating multiple risk signals to verify user identity and detect potential threats.

bitsighttn pdf Download (1.38 MB)

As you think about your TPRM program, ask yourself these questions:

CCTNacl default Download

This report analyzes independent data gathered on over 800 multi-party cyber incidents observed over the last decade.

CCTNacl pdf Download (344 KB)

By leveraging OneTrust Vendorpedia and BitSight, this retailer is making third-party risk management a more fundamental aspect of their business operations.

bitsighttn default Download

Depending on your role in compliance and your organization’s tools, it’s likely you’re either overwhelmed in reports or are desperately searching for data to fill one. Neither are ideal situations.

CCTNacl pdf Download (966 KB)

Third-party risk management (TPRM) isn’t a new concept, however, recent events have brought the discipline into the forefront like never before. Organizations in all industries rely on third parties, whether they be cloud service providers, suppliers, contractors, and other vendors.

default Download

Gartner scored Okta as the highest scoring vendor across all three major use cases in their report “Critical Capabilities for Access Management (October 2019).*”

bitsighttn default Download

Understand how the future of operational excellence will be shaped by the pandemic. Includes three big operational shifts and how your team can prepare.

 

oktatn default Download

Consumer-facing enterprises have long been stewards of customer identity data, storing sensitive attributes ranging from a customer’s name, to credit card numbers and home addresses.

bitsighttn default Download

Learn how Western Union’s Privacy team has deployed Onspring, an intelligent automation and reporting platform, to manage restricted data access, workflow and data mining.

oktatn default Download

At Okta, we run compliance differently. Most organizations place compliance under either the legal or finance team, who don’t work with their security team to ensure those controls are implemented effectively. At Okta, we use security to drive compliance.

bitsighttn pdf Download (2.19 MB)

How to rethink your policies, processes, and plans to mitigate cyber risk in an increasingly remote workforce.

bitsighttn pdf Download (3.69 MB)

In this white paper, we take a closer look at corporate-associated residential IP addresses (WFH-RO IPs) and discover attributes that pose uniquecybersecurity risks as compared to in-office corporate networks.

oktatn default Download

This document provides an introduction to Okta’s approach to managing security throughout the following chapters:

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top