ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Control and Secure Sensitive Data

    Sponsored by: Citrix

    Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.

  • Key steps to securing data and maintaining proper access

    Sponsored by: IBM

    This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.

  • How IT Leaders Are Innovating with Customer Identity Management

    Sponsored by: Gigya

    To keep up with the competition, it's crucial to optimize the customer experience. Discover how a separate customer identity management layer in the technology stack can transform anonymous visitors into known users, enable actionable intelligence across the business, and maximize ROI.

  • Improve User Acquisition with Customer Identity & Access Management

    Sponsored by: Gigya

    In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.

  • Case Study: American Cancer Society Adopts a Comprehensive Constituent View

    Sponsored by: Gigya

    The American Cancer Society needed to more efficiently and securely manage the identities of its volunteers, donors, and participants. This case study discusses the authentication strategy that enabled them to capture and organize more data about their constituents' identities to make complete user profiles.

  • Designing Single Sign-On Architecture for Enhanced Security

    Sponsored by: CA Technologies

    Single sign-on (SSO) and session management, across a wide variety of sites using host-only cookies, can make theft much more difficult for cybercriminals. Discover ways to deliver broader, cross-application SSO for end-users using a central cookie provider.

  • The Key to Protecting Your Business Amid Cybercrime’s Current Boom

    Sponsored by: CA Technologies

    This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.

  • IoT Security: Have You Addressed These 10 Critical Issues?

    Sponsored by: Axway

    Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    With much of today's successfully executed breaches involving privileged users or credentials, mitigating risk has never been more pressing. Learn how meeting the requirements of Payment Card Industry Data Security Standard version 3 can lead to victory over privileged access violators.

  • Defending Hybrid Enterprises from Data Breaches and Insider Threats

    Sponsored by: CA Technologies

    Privileged access, accounts and credentials are critical assets for enterprises that must be highly protected through a defense-in-depth strategy. Discover ways to combine technology and processes so you can prevent data breaches, address regulatory requirements, and more.

  • Secure Data in the Cloud with AWS Identity and Access Management

    Sponsored by: Radiant Logic, Inc.

    Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.

  • A Buyer's Guide to Identity Integration Solutions

    Sponsored by: Radiant Logic, Inc.

    A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.

  • Common Identity for WAM and Federation

    Sponsored by: Radiant Logic, Inc.

    Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.

  • Turn Identity into a Business Enabler, Not an IT Bottleneck

    Sponsored by: Radiant Logic, Inc.

    This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.

  • The Key to Secure and Seamless Access to Web and Cloud Applications

    Sponsored by: Radiant Logic, Inc.

    This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.

  • Revitalize and Extend the Reach of Your Current ISAM Portal

    Sponsored by: Radiant Logic, Inc.

    This white paper teaches you how to extend authentication across web apps and leverage existing identity stores for faster, fine-grained authorization.

  • How to Federate Access and Identity Together for a Complete IdP

    Sponsored by: Radiant Logic, Inc.

    Learn how federating the identity sources behind your IdP takes you the last mile for smarter and richer attribute-based policies.

  • Simplify Cloud Access and Provisioning with a Federated Identity Service

    Sponsored by: Radiant Logic, Inc.

    What happens when there are users outside of AD-LDAP directories? This webinar examines why simply federating access in your organization isn't enough and how to federate your identity layer.

  • HDAP: the Big Data LDAP Directory Storage

    Sponsored by: Radiant Logic, Inc.

    In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.

  • Locking up the Cloud with IAM

    Sponsored by: SearchCloudSecurity.com

    In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.

  • 10 Tips to Help You Minimize the Duration and Impact of a Security Breach

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Market Overview: Customer Identity and Access Management Solutions

    Sponsored by: Gigya

    How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.

  • Leverage Accurate and Current Customer Data with Social Login

    Sponsored by: Gigya

    To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.

  • The Business Case for Hybrid Networks

    Sponsored by: MASERGY

    The market for hybrid network services is growing rapidly which is driven by the increase in enterprise bandwidth consumption — growing by 30% a year, according to Gartner market research. Access this white paper now to discover if a hybrid network is right for your business.

  • The Evolution of Consumer Identity: 5 Biggest Trends

    Sponsored by: Gigya

    This resource reveals the 5 biggest trends currently influencing the customer identity and access management space. Learn how to prepare for upcoming developments regarding traditional usernames and passwords vs biometric authentication, regional data privacy regulations, IoT, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.