ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • The IoT Journey: Freight Farms Conquers Data Challenges

    Sponsored by: Xively by LogMeIn

    Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.

  • Securing Real-Time Mobile Communications

    Sponsored by: Mitel Networks Limited

    This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.

  • Ensuring Document Security Across Any Device

    Sponsored by: BlackBerry

    Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.

  • The Total Economic Impact Of Forcepoint’s SureView Insider Threat Single Company Analysis

    Sponsored by: Forcepoint

    This white paper shows you an appliance-based security system that monitors and investigates internal threats across all endpoints and channel communications.

  • Key steps to securing data and maintaining proper access

    Sponsored by: IBM

    This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.

  • Securing the Internet of Things: 6 Crucial Steps

    Sponsored by: Hewlett-Packard Enterprise

    Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.

  • Turn iOS, Android or BlackBerry Devices into Security Tokens

    Sponsored by: BlackBerry

    In this white paper, you will learn about two-factor user authentication by leveraging passwords and users' devices. Access now and learn how to reduce associated operational costs and increase productivity with a modern authentication system.

  • How IT Leaders Are Innovating with Customer Identity Management

    Sponsored by: Gigya

    To keep up with the competition, it's crucial to optimize the customer experience. Discover how a separate customer identity management layer in the technology stack can transform anonymous visitors into known users, enable actionable intelligence across the business, and maximize ROI.

  • Improve User Acquisition with Customer Identity & Access Management

    Sponsored by: Gigya

    In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.

  • Case Study: American Cancer Society Adopts a Comprehensive Constituent View

    Sponsored by: Gigya

    The American Cancer Society needed to more efficiently and securely manage the identities of its volunteers, donors, and participants. This case study discusses the authentication strategy that enabled them to capture and organize more data about their constituents' identities to make complete user profiles.

  • Case Study: API Gateway Secures Public APIs and Minimizes Costs

    Sponsored by: Axway

    APIs can help enterprises roll out apps quickly, but exposing them to third parties can create security issues. In this case study, discover the API gateway that enabled the energy supplier First Utility to secure their publicly available APIs, optimize performance and scalability, and accelerate time to market.

  • IoT Security: Have You Addressed These 10 Critical Issues?

    Sponsored by: Axway

    Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.

  • Defending Hybrid Enterprises from Data Breaches and Insider Threats

    Sponsored by: CA Technologies

    Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.

  • A Buyer's Guide to Identity Integration Solutions

    Sponsored by: Radiant Logic, Inc.

    A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.

  • Common Identity for WAM and Federation

    Sponsored by: Radiant Logic, Inc.

    Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.

  • Turn Identity into a Business Enabler, Not an IT Bottleneck

    Sponsored by: Radiant Logic, Inc.

    This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.

  • The Key to Secure and Seamless Access to Web and Cloud Applications

    Sponsored by: Radiant Logic, Inc.

    This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.

  • Revitalize and Extend the Reach of Your Current ISAM Portal

    Sponsored by: Radiant Logic, Inc.

    This white paper teaches you how to extend authentication across web apps and leverage existing identity stores for faster, fine-grained authorization.

  • Top 5 IoT Security Questions for Manufacturers

    Sponsored by: Microsoft

    The Internet of Things has introduced new security issues for manufacturers. This infographic reveals the top 5 essential questions you need to address in order to protect your connected devices and assets. Learn how to safely connect systems, devices, and other assets, as well as 4 other critical answers.

  • How to Federate Access and Identity Together for a Complete IdP

    Sponsored by: Radiant Logic, Inc.

    Learn how federating the identity sources behind your IdP takes you the last mile for smarter and richer attribute-based policies.

  • Security for the Internet of Things: Identifying Your Weakest Links

    Sponsored by: Microsoft

    70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.

  • Security for the Internet of Things: Upcoming Trends to Watch

    Sponsored by: Microsoft

    By 2020, over 25% of identified attacks in enterprises will involve the Internet of Things (IoT). In this resource, Gartner's IoT security analysts offer predictions for upcoming market trends and recommendations about which security services are worth the investment.

  • Market Overview: Customer Identity and Access Management Solutions

    Sponsored by: Gigya

    How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.

  • Leverage Accurate and Current Customer Data with Social Login

    Sponsored by: Gigya

    To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.

  • Why Healthcare SSO is a Must-Have

    Sponsored by: Aventura

    As healthcare organizations adopt more cloud services, IT needs to mitigate poor password practices in their user base to avoid costly data breaches. This expert e-guide reviews why single sign-on (SSO) platforms have risen in popularity in healthcare organizations and presents the benefits of implementing SSO for your user base.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.