ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • In the Market for a New Key Manager? Then Get in on a Good Thing!

    Sponsored by: Gemalto

    This white paper gives you four key reasons why you need to switch to a central key manager. Learn about a full portfolio of flexible encryption options that work on-premises, in traditional data centers and virtualized cloud environments.

  • Moving Past the Password? Not So Fast

    Sponsored by: SearchSecurity.com

    The password might not be dead but that doesn't mean it's working. This guide looks at how other user authentication methods can supplement it.

  • Office 365 single sign-on augurs complexity, setup hitches

    Sponsored by: Symantec Corporation

    Could Office 365 be the perfect scenario for SSO or riddled with issues down the line? Get more insight on the impact to mobile device management and BYOD inside.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • What Are the Best Ways to Improve SMB Security?

    Sponsored by: CDW

    Expert Mike O. Villegas advises SMBs on security defenses. Uncover control measures to improve security, such as: defining data breach notification requirements, using firewalls, antivirus software, and up-to-date patches, and more.

  • Unified Identity Governance - A Business Overview

    Sponsored by: Oracle Corporation

    Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.

  • Six steps to control the uncontrollable

    Sponsored by: Microsoft

    Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.

  • Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics

    Sponsored by: Barracuda Networks

    Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.

  • Securing Office 365 with Symantec

    Sponsored by: Symantec Corporation

    How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Reaping the Benefits of Strong, Smarter User Authentication

    Sponsored by: Symantec Corporation

    Discover how the changes in enterprise IT—namely mobility and cloud—affect smart authentication implementation. Access now to learn how you can remain secure against today's evolving security threats with smarter user authentication.

  • Modernizing Active Directory for Azure and Office 365

    Sponsored by: Dell Software

    This white paper highlights best practices for modernizing and integrating your in-premises AD into Azure so that you can enjoy less administration of on-premises hardware and software and introduce your organization to identity as a service.

  • Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk

    Sponsored by: Dell Software

    Go in depth and learn what a hash is and how a PtH attack can greatly impact your network. Learn how to mitigate these types of attacks with Privileged Password Manager and Privileged Session Manager.

  • Identity and Access Management for the Real World: The Fundamentals

    Sponsored by: Dell Software

    This e-book discusses the most pressing IAM issues faced by most organizations and offers actionable and sustainable approaches to the IAM challenges you encounter. Access now to learn what IAM for the real world can and should look like.

  • How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management

    Sponsored by: Dell Software

    This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.

  • How HIPAA Compliance is Impossible without Privileged Management

    Sponsored by: Dell Software

    Achieving compliance with data security standards requires you to mitigate the risk of privileged access – in healthcare and other industries. Access this white paper now to learn how you can implement proven strategies to achieve regulatory compliance while fighting against other risks.

  • Barracuda NG Firewall Model F1000

    Sponsored by: Barracuda Networks

    This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.

  • IBM Guardium: Database security tool overview

    Sponsored by: IBM

    This e-guide shows you a proven security system that offers real-time, policy-based monitoring of database activities, including privileged user actions. Access now to learn how you can predefine security policies and put in place triggers alerts when sensitive data is accessed, and block if necessary.

  • Get Ahead of Your Next Security Breach

    Sponsored by: Dell Software

    An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.

  • Strategies for Successfully Managing Privileged Accounts

    Sponsored by: Dell Software

    The problem with many PAM programs is that they address only one or two of the underlying issues, leaving your organization insecure. Is your privileged identify management program on the right path? Sanity check inside.

  • The IoT Journey: Freight Farms Conquers Data Challenges

    Sponsored by: Xively by LogMeIn

    Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.

  • Securing Real-Time Mobile Communications

    Sponsored by: Mitel Networks Limited

    This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.

  • Ensuring Document Security Across Any Device

    Sponsored by: BlackBerry

    Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.

  • The Total Economic Impact Of Forcepoint's SureView Insider Threat

    Sponsored by: Forcepoint

    This Forrester report shows you an appliance-based security system that monitors and investigates internal threats across all endpoints and channel communications. View not and learn how you can gain visibility that other network devices cannot.

  • Key steps to securing data and maintaining proper access

    Sponsored by: IBM

    This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.