ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Secure Data in the Cloud with AWS Identity and Access Management

    Sponsored by: Radiant Logic, Inc.

    Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.

  • A Buyer's Guide to Identity Integration Solutions

    Sponsored by: Radiant Logic, Inc.

    A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.

  • Common Identity for WAM and Federation

    Sponsored by: Radiant Logic, Inc.

    Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.

  • Turn Identity into a Business Enabler, Not an IT Bottleneck

    Sponsored by: Radiant Logic, Inc.

    This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.

  • The Key to Secure and Seamless Access to Web and Cloud Applications

    Sponsored by: Radiant Logic, Inc.

    This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.

  • Revitalize and Extend the Reach of Your Current ISAM Portal

    Sponsored by: Radiant Logic, Inc.

    This white paper teaches you how to extend authentication across web apps and leverage existing identity stores for faster, fine-grained authorization.

  • How to Federate Access and Identity Together for a Complete IdP

    Sponsored by: Radiant Logic, Inc.

    Learn how federating the identity sources behind your IdP takes you the last mile for smarter and richer attribute-based policies.

  • Simplify Cloud Access and Provisioning with a Federated Identity Service

    Sponsored by: Radiant Logic, Inc.

    What happens when there are users outside of AD-LDAP directories? This webinar examines why simply federating access in your organization isn't enough and how to federate your identity layer.

  • Security for the Internet of Things: Identifying Your Weakest Links

    Sponsored by: Microsoft

    70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.

  • HDAP: the Big Data LDAP Directory Storage

    Sponsored by: Radiant Logic, Inc.

    In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.

  • Locking up the Cloud with IAM

    Sponsored by: SearchCloudSecurity.com

    In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.

  • 10 Tips to Help You Minimize the Duration and Impact of a Security Breach

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Why Healthcare SSO is a Must-Have

    Sponsored by: Aventura

    As healthcare organizations adopt more cloud services, IT needs to mitigate poor password practices in their user base to avoid costly data breaches. This expert e-guide reviews why single sign-on (SSO) platforms have risen in popularity in healthcare organizations and presents the benefits of implementing SSO for your user base.

  • The Business Case for Hybrid Networks

    Sponsored by: MASERGY

    The market for hybrid network services is growing rapidly which is driven by the increase in enterprise bandwidth consumption — growing by 30% a year, according to Gartner market research. Access this white paper now to discover if a hybrid network is right for your business.

  • Building, Installing, and Configuring a RADIUS Server

    Sponsored by: Global Knowledge

    A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.

  • Top Identity Governance and Administration Vendors Examined

    Sponsored by: IBM

    In this Gartner Magic Quadrant, you will explore the strengths of the leading IGA platforms and vendors. Access now to discover how to evaluate your needs and find which system best fits into your IAM and IGA strategy.

  • 2016 Cyber-Threat Defense Report

    Sponsored by: LogRhythm, Inc.

    This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.

  • Why the Era of Perimeter-Only Security Is Over

    Sponsored by: Fortinet, Inc.

    With today's increasingly sophisticated attacks, it's inevitable that some threats will penetrate the enterprise network's perimeter. Access this resource to discover how an internal segmentation firewall can strengthen your enterprise's overall security posture.

  • Security From the Inside Out: New Breach Defense Strategies

    Sponsored by: Fortinet, Inc.

    This resource explains why the traditional perimeter firewall isn't enough and describes how internal segmentation firewalls can help your network react to today's advanced threats. Read on to discover what you need to look for when deciding on an internal segmentation firewall solution.

  • HBR paper: The Danger from Within

    Sponsored by: Imperva

    The biggest threat to enterprise security is the people organizations hire and fire. Read this article from the Harvard Business Review, "Danger from Within" to learn why the number of insider cyberattacks is growing and what are 5 ways to tackle the problem.

  • Secure Architecture for Mobile Device Access to On-Premise Applications

    Sponsored by: Hitachi ID Systems, Inc.

    This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.

  • Computer Weekly: Robots at Your Service

    Sponsored by: ComputerWeekly.com

    Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.

  • Delivering the NHS Network of the Future

    Sponsored by: Fortinet, Inc.

    This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.

  • End-to-End Security for Next-Generation Distributed Healthcare

    Sponsored by: Fortinet, Inc.

    Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.

  • Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students

    Sponsored by: Fortinet, Inc.

    This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.