ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Challenges and Benefits of Making a Business Case for IAM

    Sponsored by: Nexmo

    This expert e-guide explores the 5 critical issues in IAM that have plagued IT for the past 5 years. Additionally, continue reading to learn how one organizations is using IAM as a strategic tool for improving performance on top of information security.

  • Next Generation Cloud Security

    Sponsored by: Symantec

    In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.

  • Cloud Identity Access: Bridging the Gap between IT and Users

    Sponsored by: Symantec

    Organizations are struggling to secure rogue cloud apps as users work remotely on a myriad of devices.  This white paper presents the challenges of securing cloud apps data and offers insights into facilitating harmony between users and IT.

  • Governance-Driven Provisioning: The Future of Provisioning

    Sponsored by: RSA

    This white paper explores the history of provisioning challenges organizations have faced and what the future holds for the technology and network security. View now to learn how a governance-driven approach improves your overall identity and access management (IAM) strategy and avoids the pitfalls of a traditional architecture.

  • Data Governance Risk: Know Who Has Your Data

    Sponsored by: RSA

    Did you know that 76% of organizations find it challenging to control access to sensitive data? Access this brief infographic to gain a better understanding of common data governance challenges and the dire consequences if they are not addressed.

  • IAM - The Foundation of Cloud Security

    Sponsored by: Symantec

    This brief white paper examines key components for an effective IAM program to protect your sensitive data from unauthorized access.

  • Single-Sign-On: Streamlining Remote Access

    Sponsored by: SecureAuth

    This case study explores how to use multi-factor authentication and single-sign-on (SSO) to remove the reliance on tokens and secure access to the enterprise network and data. Access now to examine how one organization was able to overcome authentication and access challenges using this strategy.

  • Case Study: Ensuring Automated Access Governance

    Sponsored by: RSA

    In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.

  • The Evolution of Provisioning

    Sponsored by: RSA

    This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.

  • Case Study: Secure File Sharing with Investors

    Sponsored by: IntraLinks, Inc

    This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.

  • Azure Active Directory Solutions for Identity and Access Management

    Sponsored by: Microsoft

    In this white paper, discover several common scenarios and understand how Azure™ Active Directory® (Azure AD) provides a comprehensive solution that addresses identity and access management requirements for on-premises and cloud applications, including Office 365 and a world of non-Microsoft SaaS applications.

  • Flexible, secure solutions to keep unauthorized users out of your data

    Sponsored by: Dell, Inc. and Intel®

    Inside this white paper, find out how to go beyond passwords with advanced authentication measures in order to secure data at every endpoint in your organization. Discover security tools that are designed to provide an end-to-end coverage and support for advanced hardware authentication.

  • Secure network traffic between hosts systems and remote PCs/web browsers

    Sponsored by: OpenText

    Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.

  • Critical Factors to Endpoint Security

    Sponsored by: Dell, Inc. & Intel®

    Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.

  • Device and Data Protection - Part 1

    Sponsored by: Dell, Inc. and Intel®

    Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.

  • Fast, secure access to information assets from PCs and web browsers

    Sponsored by: OpenText

    Inside this resource, examine a technology offering both desktop-based software and a web-to-host terminal that provides fast and reliable connections from each to mainframes and other enterprise host systems. Learn how you can benefit from the latest PC and web technologies while protecting your investments in data, information assets and systems.

  • Protecting and Preserving Archived Files

    Sponsored by: Imation Corp.

    Access this white paper to learn how you can authenticate data and prevent file corruption for your archived data.

  • Data Security Strategies for Next Gen Data Warehouses

    Sponsored by: IBM

    In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.

  • Website Security for Dummies

    Sponsored by: Symantec

    In this free e-book, find clear, straightforward guidelines for ensuring airtight website security.

  • Your Quick Reference Guide to Always-On SSL

    Sponsored by: Symantec

    This white paper explains the benefits of always-on SSL and how you can implement it on your sites.

  • Manage Identities & Access for Continuous Compliance & Reduced Risk

    Sponsored by: IBM

    Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.

  • Virtualized Desktops in Healthcare

    Sponsored by: Imprivata

    Ensure a successful virtual desktop infrastructure (VDI) deployment by learning how to overcome the most common barriers, such as clinical adoption, high overhead costs, and meeting new authentication needs.

  • Critical Factors in Endpoint Security

    Sponsored by: Dell, Inc. and Intel®

    Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.

  • Combating Password Sharing and Misuse with IAM

    Sponsored by: SailPoint Technologies

    In this expert eguide, explore the staggering statistics of irresponsible password use and how IAM can save your organization from being in the next breach headline.

  • Helpful Hints for Identity and Access Management

    Sponsored by: SailPoint Technologies

    This expert e-guide walks you through the 15 IAM challenges of today and how to craft a strategy to overcome or avoid them. View now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.