ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Introduction to Open Legacy

    Sponsored by: Open Legacy

    Read this white paper to learn about a disruptive approach to enterprise application integration that opens a safe gateway between legacy systems inside the enterprise and mobile, web, and cloud solutions.

  • Enabling Mobility without Compromising Security

    Sponsored by: Dell Software

    This white paper examines the top 5 mobile security challenges and introduces a model that charts the benefits and risks of various mobile access approaches.

  • Securing the Mobile Enterprise with 3 New Approaches

    Sponsored by: HID

    This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.

  • Government -OpenLegacy replaces old HTML emulation solution at the Israel Airport Authority with a modern web application

    Sponsored by: Open Legacy

    Access this white paper to find out how IAA's engineers developed a dedicated mobile application to handle all aspects of security personnel management, including shift planning and assignment.

  • DevOps on IBM z Systems E-guide

    Sponsored by: IBM

    This e-guide explains why adopting DevOps can result in more efficient and effective applications with continuous process improvement. Read now to ensure that any changes and enhancements to software are based on real customer feedback.

  • Secure Mobile Access: Overcoming Today's BYOD Obstacles

    Sponsored by: Dell Software

    This white paper examines the need for a holistic security strategy to address the end-to-end mobility and BYOD challenges.

  • How to Securely Sync, Share, Collaborate, and Manage Business Content

    Sponsored by: IntraLinks, Inc

    This white paper examines one Software as a Service (SaaS) strategy and how it enables mobile content access and secure file sharing outside of the firewall. View now to see how other organizations have used this approach to protect data and files as they are accessed and shared and if it is right for your organization.

  • Challenges and Benefits of Making a Business Case for IAM

    Sponsored by: Nexmo

    This expert e-guide explores the 5 critical issues in IAM that have plagued IT for the past 5 years. Additionally, continue reading to learn how one organizations is using IAM as a strategic tool for improving performance on top of information security.

  • Next Generation Cloud Security

    Sponsored by: Symantec

    In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.

  • Defending Against New Ransomware Threats

    Sponsored by: Trend Micro

    In this white paper, discover five ways to make sure you're prepared for a ransomware attack.

  • Governance-Driven Provisioning: The Future of Provisioning

    Sponsored by: RSA

    This white paper explores the history of provisioning challenges organizations have faced and what the future holds for the technology and network security. View now to learn how a governance-driven approach improves your overall identity and access management (IAM) strategy and avoids the pitfalls of a traditional architecture.

  • Data Governance Risk: Know Who Has Your Data

    Sponsored by: RSA

    Did you know that 76% of organizations find it challenging to control access to sensitive data? Access this brief infographic to gain a better understanding of common data governance challenges and the dire consequences if they are not addressed.

  • IAM - The Foundation of Cloud Security

    Sponsored by: Symantec

    This brief white paper examines key components for an effective IAM program to protect your sensitive data from unauthorized access.

  • Single-Sign-On: Streamlining Remote Access

    Sponsored by: SecureAuth

    This case study explores how to use multi-factor authentication and single-sign-on (SSO) to remove the reliance on tokens and secure access to the enterprise network and data. Access now to examine how one organization was able to overcome authentication and access challenges using this strategy.

  • Hybrid Environments Demand Coordinated IAM for both Security and Agility

    Sponsored by: Microsoft

    Access this resource to see the results of a Forrester Consulting report which reveals how organizations are using IAM in hybrid clouds and the benefits it can bring if handled with care.

  • Case Study: Ensuring Automated Access Governance

    Sponsored by: RSA

    In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.

  • Hybrid Environments Demand Coordinated IAM For Both Security And Agility

    Sponsored by: Microsoft

    View this informative report issued by Forrester that explains the IAM challenges firms are facing with hybrid cloud architecture, how these are being addressed currently, and the projected evolution of these management techniques in response to continued and accelerated cloud adoption.

  • Making Big Data Accessible, Actionable and Affordable

    Sponsored by: Kofax, Inc.

    Read this white paper for use cases of real-world customers who are reaping benefits from big data that was once almost impossible to access. Learn how your organization can also harness this data from internal and external sources and put it in the hands of business users rapidly and cost-effectively.

  • Smartsheet Uses Microsoft Azure Active Directory

    Sponsored by: Microsoft

    Tune into this video to learn about a service that integrates with Microsoft Azure and Office 365 designed to help people use their company based credentials to access the information that they need.

  • The Evolution of Provisioning

    Sponsored by: RSA

    This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.

  • Centricity™ Cardio Enterprise Solution for the Echo Lab

    Sponsored by: GE Healthcare

    Centricity Cardio Enterprise solution for the Echo Lab empowers cardiologists to help enhance patient care through full clinical access, optimized productivity, and improved revenue cycle efficiencies. Read this white paper to learn more about this single point of access to unified patient data, images, and reports.

  • Case Study: Secure File Sharing with Investors

    Sponsored by: IntraLinks, Inc

    This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.

  • Simplify, Unify Access with a Converged Campus Network

    Sponsored by: Hewlett-Packard Company

    This white paper explores how converging wired and wireless access layers can help you gain the ability to meet the exploding demand for connectivity in a way that is not only sustainable, secure, and manageable, but can also deliver a better user experience.

  • Empowering Cardiologists to Enhance Patient Care

    Sponsored by: GE Healthcare

    Read this white paper to learn how cardiologists can gain a single point of access to unified patient data, images, and reports across multiple modalities, with end-to-end configurable workflows. Additionally, cardiologists can enhance patient care through improved productivity and revenue cycle efficiencies.

  • An Inside Look at the Azure Active Directory

    Sponsored by: Microsoft

    In this video, learn about Microsoft's Azure Active Directory from a developer's standpoint and get a glimpse of the new identity features in Visual Studio 2015 that make it easy to secure applications with Azure AD

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.