ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Information Security and Data Privacy Practices

    Sponsored by: Gigya

    Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.

  • Six Steps to Controlling the Uncontrollable

    Sponsored by: Microsoft

    With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.

  • Controlling the Uncontrollable: Why You Need to Enable, Protect, and Manage Mobile

    Sponsored by: Microsoft

    This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    New rules for EFSS providers have been put in place that provide security benefits to customer data while restricting access of files to EFSS providers. Access this resource to learn these 5 new rules, and how your EFSS provider should be reacting.

  • Five Critical Rules for Firewall Management: Lessons from the Field

    Sponsored by: Dell SecureWorks

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.

  • Blue Skies Ahead? The State of Cloud Adoption

    Sponsored by: Intel Security

    IT needs greater visibility to achieve better trust in cloud security. This comprehensive report reveals the results of a survey conducted with 1,200 IT decision-makers across 8 different countries about the security challenges they've faced with cloud adoption.

  • The IoT Journey: Freight Farms Conquers Data Challenges

    Sponsored by: Xively by LogMeIn

    Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.

  • Control and Secure Sensitive Data

    Sponsored by: Citrix

    Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.

  • Key steps to securing data and maintaining proper access

    Sponsored by: IBM

    This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.

  • How IT Leaders Are Innovating with Customer Identity Management

    Sponsored by: Gigya

    With IT budgets limited, enterprises often struggle to secure funds for innovations that enable crucial relationships with customers. Access this white paper that explains how a separate customer identity management layer can help you attract customers while maximizing budget and ROI.

  • Improve User Acquisition with Customer Identity & Access Management

    Sponsored by: Gigya

    In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.

  • Case Study: American Cancer Society Adopts a Comprehensive Constituent View

    Sponsored by: Gigya

    The American Cancer Society needed to more efficiently and securely manage the identities of its volunteers, donors, and participants. This case study discusses the authentication strategy that enabled them to capture and organize more data about their constituents' identities to make complete user profiles.

  • 10 Tips to Minimize the Duration and Impact of a Security Breach

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Market Overview: Customer Identity and Access Management Solutions

    Sponsored by: Gigya

    How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.

  • Leverage Accurate and Current Customer Data with Social Login

    Sponsored by: Gigya

    To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.

  • The Business Case for Hybrid Networks

    Sponsored by: MASERGY

    The market for hybrid network services is growing rapidly which is driven by the increase in enterprise bandwidth consumption — growing by 30% a year, according to Gartner market research. Access this white paper now to discover if a hybrid network is right for your business.

  • The Evolution of Consumer Identity: 5 Biggest Trends

    Sponsored by: Gigya

    This resource reveals the 5 biggest trends currently influencing the customer identity and access management space. Learn how to prepare for upcoming developments regarding traditional usernames and passwords vs biometric authentication, regional data privacy regulations, IoT, and more.

  • How the Cloud Access Security Broker Space Is Evolving

    Sponsored by: Palerra Inc.

    The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.

  • Defend your Organization with Advanced SIEM and Privileged Account Controls

    Sponsored by: Splunk

    As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.

  • IBM MaaS360 Mobile Application Management

    Sponsored by: IBM MaaS360

    Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • DataWorks Solution Brief

    Sponsored by: IBM

    42% of business professionals spend more than 40% of their time fixing and validatiing data before analyzing it. With increasing amounts of data coming from new technologies, this is a major pain point. Read on to learn about a solution that delivers data quality and easy access for business users.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Locking up the Cloud with IAM

    Sponsored by: SearchCloudSecurity.com

    In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.

  • Secure Architecture for Mobile Device Access to On-Premise Applications

    Sponsored by: Hitachi ID Systems, Inc.

    This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.