ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • 10 Tips to Help You Minimize the Duration and Impact of a Security Breach

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Market Overview: Customer Identity and Access Management Solutions

    Sponsored by: Gigya

    How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.

  • Leverage Accurate and Current Customer Data with Social Login

    Sponsored by: Gigya

    To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.

  • The Business Case for Hybrid Networks

    Sponsored by: MASERGY

    The market for hybrid network services is growing rapidly which is driven by the increase in enterprise bandwidth consumption — growing by 30% a year, according to Gartner market research. Access this white paper now to discover if a hybrid network is right for your business.

  • The Evolution of Consumer Identity: 5 Biggest Trends

    Sponsored by: Gigya

    This resource reveals the 5 biggest trends currently influencing the customer identity and access management space. Learn how to prepare for upcoming developments regarding traditional usernames and passwords vs biometric authentication, regional data privacy regulations, IoT, and more.

  • Why Identity is at the Heart of the IoT

    Sponsored by: Gigya

    This resource describes how a well-designed customer identity and access management (cIAM) strategy can unlock the true capabilities of the IoT. Discover use cases that demonstrate how cIAM can offer secure, personalized user experiences with connected products.

  • Building, Installing, and Configuring a RADIUS Server

    Sponsored by: Global Knowledge

    A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.

  • Top Identity Governance and Administration Vendors Examined

    Sponsored by: IBM

    In this Gartner Magic Quadrant, you will explore the strengths of the leading IGA platforms and vendors. Access now to discover how to evaluate your needs and find which system best fits into your IAM and IGA strategy.

  • 2016 Cyber-Threat Defense Report

    Sponsored by: LogRhythm, Inc.

    This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.

  • Why the Era of Perimeter-Only Security Is Over

    Sponsored by: Fortinet, Inc.

    With today's increasingly sophisticated attacks, it's inevitable that some threats will penetrate the enterprise network's perimeter. Access this resource to discover how an internal segmentation firewall can strengthen your enterprise's overall security posture.

  • Security From the Inside Out: New Breach Defense Strategies

    Sponsored by: Fortinet, Inc.

    This resource explains why the traditional perimeter firewall isn't enough and describes how internal segmentation firewalls can help your network react to today's advanced threats. Read on to discover what you need to look for when deciding on an internal segmentation firewall solution.

  • Executive Viewpoint: Getting Tough on Security Threats

    Sponsored by: F5 Networks

    In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.

  • A Guide to Protecting your Critical Assets with Identity Governance

    Sponsored by: IBM

    In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.

  • How Identity Governance Became a Key Compliance and Risk Control

    Sponsored by: IBM

    In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.

  • Combating the Insider Threat: Your Guide to Staying Secure

    Sponsored by: Cisco Systems, Inc.

    This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.

  • SaaS Safety and Security: Taming the Office Password Monster

    Sponsored by: Dashlane Inc.

    Learn if you're leaving the door open for hackers in this white paper as it shines a light on the many password management blunders. Discover how to keep login simple for your users without creating undue risk.

  • Social Networking: 5 Risks of Team Login Sharing

    Sponsored by: Dashlane Inc.

    Discover the 5 risks of team social networking login sharing and how to secure an always-on culture to connect with customers.

  • Password Hacking: Are You Safer in the Cloud?

    Sponsored by: Dashlane Inc.

    This white paper teaches you how to secure your password management strategy in the cloud in 3 simple steps. Continue reading to learn why you need to kill simple password rules and how to adapt to cloud authentication and access.

  • Secure Architecture for Mobile Device Access to On-Premise Applications

    Sponsored by: Hitachi ID Systems, Inc.

    This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.

  • Computer Weekly: Robots at Your Service

    Sponsored by: ComputerWeekly.com

    Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.

  • Delivering the NHS Network of the Future

    Sponsored by: Fortinet, Inc.

    This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.

  • End-to-End Security for Next-Generation Distributed Healthcare

    Sponsored by: Fortinet, Inc.

    Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.

  • Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students

    Sponsored by: Fortinet, Inc.

    This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.

  • How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

    Sponsored by: CA Technologies.

    This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.

  • Break the Kill Chain: Stop Data Breaches

    Sponsored by: CA Technologies.

    Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.