ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

    Sponsored by: CA Technologies.

    This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.

  • Best Practices for Securing Privileged Identities

    Sponsored by: CA Technologies

    Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.

  • Break the Kill Chain: Stop Data Breaches

    Sponsored by: CA Technologies.

    Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.

  • Research Report: Enabling the Full Potential of New Operating Systems

    Sponsored by: Microsoft

    This executive brief uses recent research to outline some of the challenges facing client computing, security, and compliance teams. Discover ways new capabilities - such as biometric authentications, universal application deployment, and a seamless app experience - demand a new generation of hardware to properly enable and support them.

  • Context-Aware, Dynamic Access Control

    Sponsored by: Cryptzone

    This brief resource outlines how security pros need to take a dynamic approach to secure network access. Read on to learn about a new platform that considers both context and identity to grant access to your network, and see if it's right for your business.

  • A Guide to Protecting your Critical Assets with Identity Governance

    Sponsored by: IBM

    In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.

  • How Identity Governance Became a Key Compliance and Risk Control

    Sponsored by: IBM

    In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.

  • Infographic: Safely Adopt Cloud Services Without Sacrificing Security

    Sponsored by: F5 Networks

    In this infographic, learn some common by often overlooked risks that come with cloud application adoption. Additionally, explore the benefits of one security option that can mitigate these risks, including: ease users' password management, multi-factor authentication, and more.

  • Customer Success Story: Unisys Video Case Study

    Sponsored by: SecureAuth

    This case study details how one company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.

  • Eliminating the Drawbacks of Distributed SaaS Provider Identity

    Sponsored by: F5 Networks

    In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.

  • Deploy an Enterprise Mobility Gateway to Optimize Access Control

    Sponsored by: F5 Networks

    In this white paper, you will learn how to scale, secure, and optimize control of your anytime, anywhere network, cloud, and application access. Read this paper to securely manage your workforce mobility and unburden your IT department and learn how to deliver seamless user access to all web-based resources.

  • How to Stop Cyber Attacks Using Adaptive Authentication

    Sponsored by: SecureAuth

    This informative webinar takes a look at how next generation adaptive authentication so that you can stay a step ahead of criminals. Tune in to learn how you can easily identify suspicious actors before they enter your network, not after they violate a policy.

  • SecureAuth - Houston Methodist

    Sponsored by: SecureAuth

    In this video, you will learn how to quickly and easily secure your authentication process for your employees to access both existing and new technologies. Move your business into the cloud with confidently and securely.

  • Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare

    Sponsored by: SecureAuth

    In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.

  • Using Identity to Create Next Generation, Risk-based Access Management

    Sponsored by: SecureAuth

    In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.

  • Evaluating Standout Services in the Cloud Identity and Access Management Sector

    Sponsored by: SecureAuth

    If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.

  • The Crucial Security Role of a Cloud Directory

    Sponsored by: Microsoft

    In this webcast, independent analyst and blogger Jack Madden takes a closer look at how a cloud directory can play a crucial security role in user and identity management for mobile and beyond.

  • Enhacing IAM and Authentication with Threat Intelligence

    Sponsored by: SecureAuth

    What happens when two authentication leaders unite to create a new platform to advance threat detection? You'll have to read this white paper to find out. Read on now to learn how to use keystroke analysis to detect signs of compromised credentials earlier.

  • The Challenge of Keeping IAM Simple

    Sponsored by: Thycotic

    This expert e-guide presents the individual challenges the 4 key IAM roles face as they work to mitigate identity fraud/theft. Continue reading to learn why previous IAM projects have failed and how you can overcome the many challenges your organization faces to simplify your IAM approach.

  • Flipping the Script: Law Firms Hunted by Cybercriminals

    Sponsored by: SurfWatch Labs

    This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.

  • Privileged Password Security Policy Template

    Sponsored by: Thycotic

    This white paper offers a security policy template to enable your organization to secure user access accounts from basic profiles to advanced privileges. View now to learn how to comply with governance requirements and enhance IAM security.

  • Privileged Access Management: Why Sudo in Longer Enough

    Sponsored by: FoxT

    This white paper presents Sudo's shortcomings for identity and access management of privileged accounts and what you can do to guarantee secure authentication for users. Read on to learn more.

  • Utility Protects Servers and Simplifies Compliance with Access Management

    Sponsored by: FoxT

    Defining, managing, and enforcing authentication automatically across diverse IT platforms and locations is no easy feat. This case study explores how South Western Electric & Power Company enabled effective access control and centralized administration, authentication, authorization, and auditing.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: SearchSecurity.com

    In our threat-laden environment, multifactor authentication tools are a critical defense. Learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • Hacker Survey Report: The Flaws in IAM

    Sponsored by: Thycotic

    In this white paper, examine the shocking truths about identity and access management (IAM) flaws and the war against hackers. Learn 4 steps to stronger privileged account management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.