ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • A Tactical Guide to Finding the Right IDaaS Provider

    Sponsored by: Simeio

    The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.

  • Are You Sure You Didn't Authorize Someone You Shouldn't Have?

    Sponsored by: HID

    Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.

  • Simplify Authentication with Personal Identity Verification

    Sponsored by: HID

    It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.

  • Black Hat Survey 2017

    Sponsored by: Thycotic

    At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.

  • The Pitfalls and Promises of Authentication in the IoT

    Sponsored by: iovation, Inc.

    Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.

  • Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences

    Sponsored by: NICE Systems, Inc

    Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.

  • PASSIVE Voice Biometrics in ACTIVE Channels

    Sponsored by: NICE Systems, Inc

    Learn about the evolution of active vs. passive voice biometrics (VB) and how they combine with other speech processing technologies like automated speech recognition (ASR) to improve authentication and identity assertion in tandem with machine learning and AI.

  • Overcome Authentication Challenges: Balancing Security and User Experience

    Sponsored by: iovation, Inc.

    How can you increase authentication security without impacting user experience? Take a closer look at flexible authentication that can help you meet these challenges with global fraud and trust insight, interactive multi-factor authentication, and more.

  • Moving Beyond the Password: Consumers' Views on Authentication

    Sponsored by: iovation, Inc.

    A 2017 Aite Group survey of 1,095 U.S. consumers who use online and/or mobile banking reveals users' perceptions of various forms of authentication. Uncover key findings from this study and expert recommendations to improve authentication security and user experience.

  • How to Achieve End-to-End Authentication

    Sponsored by: iovation, Inc.

    Examine how to overcome top authentication challenges by adapting to different levels of risk in real time. Uncover how you can use this method to respond to different risk scenarios.

  • Making the Move to Dynamic Multifactor Authentication

    Sponsored by: iovation, Inc.

    Passwords. The most hated thing we can't live without. Take a look at new advances in multifactor authentication that can create a more intuitive experience for the end user. Uncover how MFA works, the state of MFA adoption, and 5 reasons to move to a flexible MFA approach.

  • Why a Virtual Browser is Important For Enterprise Security

    Sponsored by: Authentic8, Inc.

    More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.

  • Dynamic Authentication

    Sponsored by: iovation, Inc.

    It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.

  • How LepideAuditor Helps You Detect and Prevent Privilege Abuse

    Sponsored by: Lepide Software

    Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.

  • How to Track Privileged Users' Activities in the Active Directory

    Sponsored by: Lepide Software

    Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities.

  • How LepideAuditor Helps You Detect and Prevent Insider Threats

    Sponsored by: Lepide Software

    Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.

  • AI, Risk-Based and Context: Trading in Your Password for the Intelligent Future

    Sponsored by: Crossmatch

    Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.

  • Podcast: Post-Password Security: AI, Risk-Based and Context

    Sponsored by: Crossmatch

    Weak and stolen passwords lead to data beaches, but how do you get rid of them? In this podcast, join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.

  • Composite Authentication: The Evolution Beyond 2FA/MFA

    Sponsored by: Crossmatch

    In this podcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.

  • Composite Authentication: Understand Security Beyond Passwords

    Sponsored by: Crossmatch

    82% of breaches are caused by lost, easily hacked or stolen passwords, according to the Verizon DBIR. In this transcript, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.

  • Getting Started with Cloud IAM Services

    Sponsored by: OneLogin

    In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.

  • Passwords are Out: But What's Replacing Them?

    Sponsored by: Crossmatch

    Join experts Keven Beaver and Jeff Carpenter in this webcast as they discuss why passwords are obsolete and what the "human-proofed" future of authentication will look like.

  • IAM: On-Premises vs. IDaaS Delivery

    Sponsored by: OneLogin

    Which is better for your organization: on-premises IAM or IDaaS? This Gartner report can provide valuable insight into which one may be best for you.

  • Top Trends Shaping IAM in 2017

    Sponsored by: OneLogin

    With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.

  • Identify, Connect, and Protect Mobile and IoT at the Edge

    Sponsored by: Aruba Networks

    Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.