ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Six Steps to Controlling the Uncontrollable

    Sponsored by: Microsoft

    With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.

  • Controlling the Uncontrollable: Why You Need to Enable, Protect, and Manage Mobile

    Sponsored by: Microsoft

    This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    New rules for EFSS providers have been put in place that provide security benefits to customer data while restricting access of files to EFSS providers. Access this resource to learn these 5 new rules, and how your EFSS provider should be reacting.

  • Five Critical Rules for Firewall Management: Lessons from the Field

    Sponsored by: Dell SecureWorks

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.

  • Control and Secure Sensitive Data

    Sponsored by: Citrix

    Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.

  • 10 Tips to Minimize the Duration and Impact of a Security Breach

    Sponsored by: Dell SecureWorks

    Uncover the top 10 actions you should take to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • The Business Case for Hybrid Networks

    Sponsored by: MASERGY

    The market for hybrid network services is growing rapidly which is driven by the increase in enterprise bandwidth consumption — growing by 30% a year, according to Gartner market research. Access this white paper now to discover if a hybrid network is right for your business.

  • Building, Installing, and Configuring a RADIUS Server

    Sponsored by: Global Knowledge

    A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.

  • The Top 5 Tasks to Automate for Privileged Account Management and Security

    Sponsored by: Thycotic

    In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage.

  • Case Study: Protecting Privileged Accounts for a Global Manufacturer

    Sponsored by: Thycotic

    Identity and access management is one of the easiest and most effective ways that organizations can prevent catastrophic data breaches. In this case study, learn how one manufacturing company restructured their outdated access and password management strategy to meet compliance requirements and mitigate data breaches, theft, and loss.

  • Combating the Insider Threat: Your Guide to Staying Secure

    Sponsored by: Cisco Systems, Inc.

    This e-book explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.

  • Hacker Survey Report: The Flaws in IAM

    Sponsored by: Thycotic

    In this white paper, examine the shocking truths about identity and access management (IAM) flaws and the war against hackers. Learn 4 steps to stronger privileged account management.

  • Are You Ready for a New Era of Risk?

    Sponsored by: Global Knowledge

    In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Locking up the Cloud with IAM

    Sponsored by: SearchCloudSecurity.com

    In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.

  • Secure Architecture for Mobile Device Access to On-Premise Applications

    Sponsored by: Hitachi ID Systems, Inc.

    This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.

  • Computer Weekly: Robots at Your Service

    Sponsored by: ComputerWeekly.com

    Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.

  • Delivering the NHS Network of the Future

    Sponsored by: Fortinet, Inc.

    This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.

  • End-to-End Security for Next-Generation Distributed Healthcare

    Sponsored by: Fortinet, Inc.

    Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.

  • Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students

    Sponsored by: Fortinet, Inc.

    This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.

  • How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

    Sponsored by: CA Technologies.

    This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.

  • Break the Kill Chain: Stop Data Breaches

    Sponsored by: CA Technologies.

    Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.

  • Bolster Your DLP Systems for Safer File Sharing and Collaboration

    Sponsored by: FinalCode

    In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.

  • Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency

    Sponsored by: FinalCode

    Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.

  • Top 8 Identity and Access Management Challenges with Your SaaS Applications

    Sponsored by: Okta

    Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.