Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Account Monitoring

Below you will find reports with the tag of “Account Monitoring”

image from 2021 Identity and Access Management Report

2021 Identity and Access Management Report

The 2021 Identity and Access Management Report reveals the increasing importance of managing access as part of an organization’s overall risk management and security posture in the new normal of hybrid work locations. The report highlights what is and what is not working for security operations teams in securing access to sensitive data, systems, and applications.

(more available)
Added: October 18, 2022
image from Identity and Access Management Report

Identity and Access Management Report

A review of community members opinions on their prioritization for identity access management systems, the challenges implementing these solutions, and the desired capabilities when selecting IAM technologies.

(more available)
Added: July 27, 2020
image from The State Of The Federal IT Landscape

The State Of The Federal IT Landscape

From the report, “For the State of the Federal IT Landscape report, OneLogin commissioned CITE Research to conduct an online, in-depth survey of 150 federal IT professionals in the United States. The goal of the survey was to understand: The current federal IT landscape, Security concerns and challenges facing federal agencies, IT plans with regard to the cloud, Technologies in use or being considered to address concerns. This survey was conducted in late October of 2018.” Read on to find out more.

(more available)
Added: February 8, 2019
image from How Tanium helps address the CIS Critical Security Controls/SANS Top 20

How Tanium helps address the CIS Critical Security Controls/SANS Top 20

This paper provides a checklist to address CIS Critical Security Controls.

Added: December 29, 2018
image from Healthcare And Life Sciences: Closing The SaaS Security Gap

Healthcare And Life Sciences: Closing The SaaS Security Gap

This paper seeks to help improve the IT situation in the Healthcare industry.

Added: October 24, 2018
image from Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. This paper will discuss six of the top considerations.

(more available)
Added: October 17, 2018
image from Controlling Lateral Movement In Unix And Linux Environments

Controlling Lateral Movement In Unix And Linux Environments

This technical brief will describe how you can use PowerBroker for Unix & Linux in your *NIX server environment to address and enforce the NIST requirements, as well as the principles of a mature system access model to limit or prevent lateral movement within your environment. These principles apply to identity management, access control, and server configuration and monitoring, operating as a triad to support a strong security program.

(more available)
Added: October 13, 2018
© Cyentia Institute 2025
Library updated: June 26, 2025 16:08 UTC (build b1d7be4)