ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Unified Identity Governance - A Business Overview

    Sponsored by: Oracle Corporation

    Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.

  • Six steps to control the uncontrollable

    Sponsored by: Microsoft

    Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.

  • Controlling the uncontrollable

    Sponsored by: Microsoft

    29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.

  • A Comprehensive, Innovative Approach to Cloud Security

    Sponsored by: Unisys

    The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.

  • Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems

    Sponsored by: Unisys

    Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.

  • Securing Office 365 with Symantec

    Sponsored by: Symantec Corporation

    How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Reaping the Benefits of Strong, Smarter User Authentication

    Sponsored by: Symantec Corporation

    Discover how the changes in enterprise IT—namely mobility and cloud—affect smart authentication implementation. Access now to learn how you can remain secure against today's evolving security threats with smarter user authentication.

  • Five Critical Rules for Firewall Management: Lessons from the Field

    Sponsored by: Dell SecureWorks

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.

  • Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk

    Sponsored by: Dell Software

    Go in depth and learn what a hash is and how a PtH attack can greatly impact your network. Learn how to mitigate these types of attacks with Privileged Password Manager and Privileged Session Manager.

  • Blue Skies Ahead? The State of Cloud Adoption

    Sponsored by: Intel Security

    IT needs greater visibility to achieve better trust in cloud security. This comprehensive report reveals the results of a survey conducted with 1,200 IT decision-makers across 8 different countries about the security challenges they've faced with cloud adoption.

  • How a German Utilities Company Embraced Secure Profile Management

    Sponsored by: VMware

    This infographic shows how one German company overcame its cumbersome profile management practices, enhancing end-user experience and security in the process.

  • The IoT Journey: Freight Farms Conquers Data Challenges

    Sponsored by: Xively by LogMeIn

    Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.

  • Control and Secure Sensitive Data

    Sponsored by: Citrix

    Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • Key steps to securing data and maintaining proper access

    Sponsored by: IBM

    This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.

  • Visual Analytics: Easily Explore Data to Make Decisions You Can Trust

    Sponsored by: TIBCO Software Inc.

    Many organizations are looking to invest in analytics tools to empower business users, but expert users still need analytics capabilities to fulfill more complex tasks. Discover a visual analytics platform that can support the needs of business users, advanced data scientists, and everyone in between.

  • Federated Access Management: The New Era of Secure Access

    Sponsored by: Ping Identity Corporation

    This white paper teaches you about the evolution of access management and what's driving modern access security requirements. Continue reading to learn about Federated Access Management and discover painless migration strategies to adopt this new breed of access management.

  • Designing Single Sign-On Architecture for Enhanced Security

    Sponsored by: CA Technologies

    This white paper describes how single sign-on and session management, across a wide variety of sites using host-only cookies, can make their theft much more difficult by using a centralized star topology. Access now and discover more benefits to this method.

  • The Key to Protecting Your Business Amid Cybercrime’s Current Boom

    Sponsored by: CA Technologies

    This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.

  • IoT Security: Have You Addressed These 10 Critical Issues?

    Sponsored by: Axway

    Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.

  • Defending Hybrid Enterprises from Data Breaches and Insider Threats

    Sponsored by: CA Technologies

    Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.