ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • A Risk-Driven Identity And Access Management Process Framework

    Sponsored by: Microsoft

    This Forrester Research report outlines how to use behavior-based trending methods in your identity and access management strategy to reduce security exposures and improve the user experience.

  • Understanding the Role of Stolen Credentials in Data Breaches

    Sponsored by: Palo Alto Networks

    In this white paper, learn the 2 steps of a successful credential theft, then learn about a service that fights back against both of these attack paths.

  • Understanding Identity Governance

    Sponsored by: SailPoint Technologies

    Identity governance is one of the more undervalued aspects of enterprise security. Read this white paper to learn why every organization needs identity governance, the four steps to building the case for it, and how you stand to benefit.

  • A Collaborative Strategy for Your Access Management

    Sponsored by: SailPoint Technologies

    Today's rapidly changing business environment demands that businesses be agile, innovative and secure. This white paper examines a collaborative strategy of integrating Microsoft Azure Active Directory with the identity governance capabilities of SailPoint Power of Identity.

  • Matching Your Authentication to the Speed of Your Business

    Sponsored by: MicroFocus

    This white paper outlines the reality of today's IT environments and the authentication risks associated with them, and explores some tips as to how you can balance the priorities of your business owners and those of central IT to keep your organization productive and safe.

  • Identity of Things: The Role of Identity Management in the IoT

    Sponsored by: Amido

    Identity and Access Management (IAM) has become a core platform. According to IDG, 91% of IT Managers are seeing identity management as a key enabler for their digital business initiatives. Learn why IAM is evolving with the Internet of Things (IoT), and how to ensure your digital business is built on a firm foundation of identity.

  • A Solution for Managing Privileged Access

    Sponsored by: Devolutions

    For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.

  • Aruba Campus Switching: The Foundation for the Modern Digital Workplace

    Sponsored by: Aruba Networks

    In this white paper, learn the key benefits of different types of campus switching tools to prepare your network infrastructure for the increase of doing business on mobile.

  • Privilege Management Overview: Strengths and Challenges

    Sponsored by: One Identity

    In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.

  • 80/20: The New and Not-So New World of OT and IoT Security

    Sponsored by: Atos

    This white paper explores the new environments of operational technology (OT) and the Internet of Things (IoT), acknowledging the risks within, with proven security tools and practices. Learn how to use the new 80/20 rule to navigate and simplify OT and IoT into manageable segments.

  • How to Prevent Privilege Creep and Bolster Access Management

    Sponsored by: CyberArk Software, Inc

    In this e-guide, learn how to keep identity and access management up-to-date to prevent security incidents and data breaches. Plus, hear from industry experts Michael Cobb and Dave Shackleford on best practices to help secure cloud access control and how enterprises can keep user roles and privileges aligned.

  • Advanced Authentication Strategies for Detecting Real-time Threats

    Sponsored by: HID Global

    How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.

  • Five Signs It’s Time for Mobile Workspace Delivery

    Sponsored by: Citrix

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.

  • 6 Pillars of Big Data: How to Harness Data with Tableau

    Sponsored by: Tableau Software

    Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of a big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

  • Securing Data Access Within the Healthcare Industry

    Sponsored by: VASCO Data Security International

    Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.

  • Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now

    Sponsored by: IBM

    Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

  • How the Cloud Access Security Broker Space Is Evolving

    Sponsored by: Palerra Inc.

    The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.

  • Defend your Organization with Advanced SIEM and Privileged Account Controls

    Sponsored by: Splunk

    As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.

  • Put Your Business Content to Work

    Sponsored by: IBM

    In this comprehensive resource hub, access 13 guides that will enable you to discover how to extract the most value from your business content and how to make it work for you. Learn about content engagement, data and information governance, sales transformation, and much more.

  • IBM MaaS360 Mobile Application Management

    Sponsored by: IBM MaaS360

    Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • DataWorks Solution Brief

    Sponsored by: IBM

    42% of business professionals spend more than 40% of their time fixing and validatiing data before analyzing it. With increasing amounts of data coming from new technologies, this is a major pain point. Read on to learn about a solution that delivers data quality and easy access for business users.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.