ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Compliance and Beyond: Future-Proofing Your Password Policy

    Sponsored by: Specops Software

    This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.

  • A Secure Method for Governing Your Azure Active Directory and Office 365 Applications

    Sponsored by: Quest

    This white paper outlines a method for governing and securing a hybrid Azure Active Directory environment, with tips on how to: strengthen the weakest link in the hybrid directory environment, eliminate the 3 main human-factor risks in privilege user access abuse, and more.

  • 5 Reasons Why Mobile Will Transform Enterprise Authentication

    Sponsored by: Entrust, Inc.

    Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

  • Viewpoints and Vendor Comparisons: Access Management and ID Federation

    Sponsored by: IBM

    In this market report, learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Also gain rare insight into product ratings, vendor coverage, leaders in the field, and more.

  • Keep Systems Secure with Best Practices – and Best User Experience – in Mind

    Sponsored by: IBM

    IT is in state of crisis, with hundreds of millions of identities stolen annually. Access this resource to better understand the benefits of mobile multi-factor authentication (MMFA) and learn why passwords alone aren't enough for today's security landscape.

  • How IAM has Evolved on the Cloud: The Good and the Bad

    Sponsored by: IBM

    Learn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various, virtual environments.

  • A New Paradigm for Identity Assurance

    Sponsored by: RSA

    Learn how to take authentication to the next level. Discover how to determine the risk associated with the action a user is about to take, based on context gathered over time, continuously.

  • Buyer's Guide to Identity and Access Management Solutions

    Sponsored by: IBM

    Organizations now need "threat-aware" identity and access management (IAM) tools, and this buyer's guide can help you find the IAM solution that's right for your organization. Download now for checklists of key features in 5 main areas, and tips for selecting the solution that addresses all of your IAM needs.

  • Two-Factor Authentication Helps Officers Protect and Serve New York

    Sponsored by: BlackBerry

    Learn how the field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents, keep their database safe, and enable secure mobility.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Trends in Mobile User Authentication

    Sponsored by: HID

    To keep pace with the escalation of mobile device use, IT departments need to explore new options that provide easy-to use yet highly secure authentication that works across all types of mobile devices. Access this resource to learn how to reduce multiple, complex passwords while enhancing safety and mobile security.

  • Important Modern Trends in Digital Banking

    Sponsored by: HID

    Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.

  • IAM on the Cloud: Avoiding Silos and Vulnerability

    Sponsored by: Centrify in partnership with Microsoft

    Access this e-guide now to discover how to use Identity as a Service (IDaaS) to meet both operational and security objectives.

  • The Digital Certificate: How It Works, Which to Buy

    Sponsored by: SearchSecurity.com

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

  • Take Control of Virtual Desktop Access with Two-Factor Authentication

    Sponsored by: Citrix

    In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.

  • Insider Security Threats: What CISOs Can Do to Mitigate Them

    Sponsored by: Preempt Security

    Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.

  • Best Practices for Secure and Efficient Onboarding and Off-boarding

    Sponsored by: RES Software

    Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.

  • How IAM Addresses Unstructured Content Security Risks

    Sponsored by: STEALTHbits

    Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • Why So Many Enterprises Lack Proper Authentication Methods

    Sponsored by: RSA Softcat

    Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.