ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Why Identity is at the Heart of the IoT

    Sponsored by: Gigya

    This resource describes how a well-designed customer identity and access management (cIAM) strategy can unlock the true capabilities of the IoT. Discover use cases that demonstrate how cIAM can offer secure, personalized user experiences with connected products.

  • Building, Installing, and Configuring a RADIUS Server

    Sponsored by: Global Knowledge

    A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.

  • Top Identity Governance and Administration Vendors Examined

    Sponsored by: IBM

    In this Gartner Magic Quadrant, you will explore the strengths of the leading IGA platforms and vendors. Access now to discover how to evaluate your needs and find which system best fits into your IAM and IGA strategy.

  • 2016 Cyber-Threat Defense Report

    Sponsored by: LogRhythm, Inc.

    This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.

  • Why the Era of Perimeter-Only Security Is Over

    Sponsored by: Fortinet, Inc.

    With today's increasingly sophisticated attacks, it's inevitable that some threats will penetrate the enterprise network's perimeter. Access this resource to discover how an internal segmentation firewall can strengthen your enterprise's overall security posture.

  • Security From the Inside Out: New Breach Defense Strategies

    Sponsored by: Fortinet, Inc.

    This resource explains why the traditional perimeter firewall isn't enough and describes how internal segmentation firewalls can help your network react to today's advanced threats. Read on to discover what you need to look for when deciding on an internal segmentation firewall solution.

  • A Guide to Protecting Your Critical Assets with Identity Governance

    Sponsored by: IBM

    In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on to learn how to protect assets by enforcing business-driven identity governance for managing user roles.

  • How Identity Governance Became a Key Compliance and Risk Control

    Sponsored by: IBM

    In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.

  • Combating the Insider Threat: Your Guide to Staying Secure

    Sponsored by: Cisco Systems, Inc.

    This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.

  • Southcoast Health System's Mobile Revolution

    Sponsored by: Citrix

    Discover how Southcoast Health System enabled seamless, secure, and uniform access to patient health records even as clinicians and nurses moved among facilities, and used a variety of mobile devices.

  • Are You Ready for a New Era of Risk?

    Sponsored by: Global Knowledge

    In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.

  • Safeguarding Access in the Distributed Network

    Sponsored by: HID

    This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.

  • ID and Access Management: Authentication Simplified

    Sponsored by: HID

    Discover how you can prevent irreparable damage to your company from unauthorized users with real-time authentication. Learn how you can ensure your data is protected, and grant access to authorized users with the tap of a card for Microsoft applications on your desktop, tablet, or mobile device.

  • Fast, Secure Signing for E-Prescribing of Controlled Substances

    Sponsored by: Imprivata

    This white paper explores how to reap the maximum benefits from ECPS deployment and how to ensure DEA compliance.

  • Computer Weekly: Robots at Your Service

    Sponsored by: ComputerWeekly.com

    Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.

  • Delivering the NHS Network of the Future

    Sponsored by: Fortinet, Inc.

    This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.

  • End-to-End Security for Next-Generation Distributed Healthcare

    Sponsored by: Fortinet, Inc.

    Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.

  • Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students

    Sponsored by: Fortinet, Inc.

    This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.

  • How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

    Sponsored by: CA Technologies.

    This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.

  • Break the Kill Chain: Stop Data Breaches

    Sponsored by: CA Technologies.

    Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.

  • Bolster Your DLP Systems for Safer File Sharing and Collaboration

    Sponsored by: FinalCode

    In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.

  • Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency

    Sponsored by: FinalCode

    Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.

  • Top 8 Identity and Access Management Challenges with Your SaaS Applications

    Sponsored by: Okta

    Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.

  • Your Role in AWS Security

    Sponsored by: SearchAWS

    This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.

  • Case Study: Secure Employee Remote Access through Strong Authentication

    Sponsored by: HID

    This case study examines how a London-based mobile communications retailer secure employee remote access.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.