ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Digital Certificates: Ensure Security with This 2-step Process

    Sponsored by: Blue Cedar

    Digital certificates can provide a secure second factor for authenticating connected mobile apps. Uncover how to leverage them to secure your mobile devices.

  • Securing and Illuminating the Pharmaceutical Supply Chain

    Sponsored by: Unisys

    Lack of transparency in the supply chain means a lot of pharmaceutical companies are delivering meds that could be damaged or counterfeit. Learn how one vendor is taking steps to secure and illuminate the entire pharmaceutical supply chain by identifying authentication issues.

  • Policy Management for IoT, Mobile, and Network Security

    Sponsored by: Aruba Networks

    With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform.

  • Compliance and Beyond: Future-Proofing Your Password Policy

    Sponsored by: Specops Software

    This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.

  • 5 Reasons Why Mobile Will Transform Enterprise Authentication

    Sponsored by: Entrust, Inc.

    Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.

  • Trends in Mobile User Authentication

    Sponsored by: HID

    To keep pace with the escalation of mobile device use, IT departments need to explore new options that provide easy-to use yet highly secure authentication that works across all types of mobile devices. Access this resource to learn how to reduce multiple, complex passwords while enhancing safety and mobile security.

  • Important Modern Trends in Digital Banking

    Sponsored by: HID

    Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.

  • Next-Gen Autentication

    Sponsored by: SearchSecurity.com

    This Security classroom explores the latest in authentication methods and technologies.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

  • How IAM has Evolved on the Cloud: The Good and the Bad

    Sponsored by: IBM

    Learn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.

  • IAM on the Cloud: Avoiding Silos and Vulnerability

    Sponsored by: Centrify in partnership with Microsoft

    Access this e-guide now to discover how to use Identity as a Service (IDaaS) to meet both operational and security objectives.

  • The Digital Certificate: How It Works, Which to Buy

    Sponsored by: SearchSecurity.com

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

  • Take Control of Virtual Desktop Access with Two-Factor Authentication

    Sponsored by: Citrix

    In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.

  • Insider Security Threats: What CISOs Can Do to Mitigate Them

    Sponsored by: Preempt Security

    Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.

  • Best Practices for Secure and Efficient Onboarding and Off-boarding

    Sponsored by: RES Software

    Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.

  • How IAM Addresses Unstructured Content Security Risks

    Sponsored by: STEALTHbits

    Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • Why So Many Enterprises Lack Proper Authentication Methods

    Sponsored by: RSA Softcat

    Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now

    Sponsored by: IBM

    Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.

  • Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices

    Sponsored by: Lenovo Software

    This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.