ComputerWeekly.com Research Library

Powered by Bitpipe.com

AAA Research

  • 12 API security best practices

    Sponsored by: TechTarget ComputerWeekly.com

    As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

  • 5 types of data security

    Sponsored by: TechTarget ComputerWeekly.com

    Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.

  • 6 user authentication types to secure networks

    Sponsored by: TechTarget ComputerWeekly.com

    The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.

  • A Guide to MAM and Planning for BYOD Security in the Enterprise

    Sponsored by: TechTarget Security

    In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.

  • AI in Fraud Management: Uses cases, benefits and challenges

    Sponsored by: TechTarget ComputerWeekly.com

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

  • Applications and best practices to keep your mobile devices secure

    Sponsored by: TechTarget Security

    Uncover best practices for keeping your mobile devices and applications secure.

  • 10 Tips to Help You Minimize the Duration and Impact of a Security Breach

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • 2014 Magic Quadrant for User Authentication

    Sponsored by: SafeNet Asia Ltd

    View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • 5 IAM Trends Shaping the Future of Security

    Sponsored by: Beta Systems

    Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.

  • 5 Trends to Watch in 2018 for Content Management Systems

    Sponsored by: Enginess

    In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.

  • 6 Ways to Enhance Security in AWS

    Sponsored by: SafeNet, Inc.

    In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.

  • 7 Things Every System Administrator Should Know about OpenSSH

    Sponsored by: Global Knowledge

    This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.

  • 802.1X: Port-Based Authentication Standard for Network Access Control (NAC)

    Sponsored by: Juniper Networks, Inc.

    This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.

  • A Guide to Password Use in WebSphere Application Server

    Sponsored by: Global Knowledge

    Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

  • A More Secure From Door: SSO and Strong Authentication

    Sponsored by: Imprivata

    This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.

  • Achieve secure mobile access to enterprise applications

    Sponsored by: Oracle Corporation UK Ltd

    This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.

  • ActivID® Authentication Appliance for Enterprise

    Sponsored by: HID Global

    In this brochure, discover a solution that puts an end to your identity and authentication worries.

  • Adaptive Access Management: An ROI Study

    Sponsored by: Oracle Corporation

    Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.

  • Adaptive Strong Auth & Federated SSO - The New Power Couple

    Sponsored by: Intel

    Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.

  • All You Need to Know about SSO

    Sponsored by: HYPR

    The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: TechTarget Security

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Sponsored by: Ping Identity Corporation

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

  • An Introduction to the FIDO Authentication Standard

    Sponsored by: HYPR

    63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.

  • As data grows, so do the risks: How to improve data and app sec

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

Browse by Report Type: AAA White Papers | AAA Multimedia | AAA IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.