ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?

    Sponsored by: Simeio

    When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.

  • New Cybersecurity Regulations Adopted to Protect Financial Systems & Information

    Sponsored by: HID Global

    According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.

  • How Apache Software Foundation Streamlined Code-Signing and Managed SSL Certificates

    Sponsored by: Symantec

    In this case study, discover how the Apache Software Foundation was able to streamline cloud-based code-signing for 350 products and 4,000 developers and more effectively manage SSL certificates for its servers.

  • Citrix Systems, Inc.

    Sponsored by: Symantec & Blue Coat Systems

    This case study reveals how Citrix Systems, Inc. wanted to move two-factor authentication (2FA) into the cloud to reduce costs and improve flexibility and reliability.

  • AWS Key Management Service Best Practices

    Sponsored by: Amazon Web Services

    This white paper details how you can use the AWS Key Management Service to protect sensitive information across 5 core areas, including identity and access management, detective control, and more.

  • Gemalto Wades Deeper into IDaaS Waters with Adaptive Access Controls for Cloud Resources

    Sponsored by: Gemalto

    Authentication and access controls typically present a tradeoff between security and convenience. This white paper keys into how Gemalto SafeNet offers 3 core functions each time a user attempts to access on-premises or cloud resources.

  • Create A Simpler, Secure, more Agile Network

    Sponsored by: Nokia

    Uncover the immediate benefits of a virtualized software-based approach that makes it easier to enable essential network security elements. These include authentication, authorization and accounting, diameter routing agents and session border controllers.

  • SSO in the Cloud and Mobile Era

    Sponsored by: TechTarget

    Does enterprise single sign-on (SSO) provide adequate security? Our exclusive resource, SSO in the Cloud and Mobile Era, explores the promises and challenges ahead for SSO technology.

  • The Truth about Single Sign-on

    Sponsored by: One Identity

    Single sign-on (SSO) is the most visible part of identity and access management (IAM). Take a look at this white paper to tackle 5 common myths about SSO, and identify key questions you should ask in order to find the best approach to IAM and SSO for your organization.

  • VPN Access Made Easier Without Sacrificing Security

    Sponsored by: HID Global

    VPNs create a secure tunnel between company data and employee devices, however they don't protect against weak passwords. Access this resource to learn how to increase the security of the VPN and maintain usability.

  • The Evolution from Two-Factor Authentication to Identity Assurance

    Sponsored by: RSA

    Identity is today's most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance.

  • 20 Practical Tips for Single Sign-On Implementation

    Sponsored by: Imprivata

    Uncover 20 valuable tips to ensure successful SSO for your organization, so that your care providers can spend less time remembering passwords and more time treating patients.

  • Advanced IAM for Endpoint and Mobile

    Sponsored by: IBM

    Inside this white paper, learn how IAM can help simplify access to your cloud and mobile apps while increasing security.

  • Unified Endpoint Management for All Device Types

    Sponsored by: IBM

    Organizations are now on the hook to manage virtually every type of end-user device and many security risks come from a mixed-device environment. Inside this white paper, uncover how a unified endpoint management system can help your organization achieve the security and visibility it needs.

  • Privilege Management Overview: Strengths and Challenges

    Sponsored by: One Identity

    In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.

  • A Tactical Guide to Finding the Right IDaaS Provider

    Sponsored by: Simeio

    The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.

  • Are You Sure You Didn't Authorize Someone You Shouldn't Have?

    Sponsored by: HID Global

    Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.

  • Simplify Authentication with Personal Identity Verification

    Sponsored by: HID Global

    It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.

  • Black Hat Survey 2017

    Sponsored by: Thycotic

    At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.

  • The Pitfalls and Promises of Authentication in the IoT

    Sponsored by: iovation, Inc.

    Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.

  • Overcome Authentication Challenges: Balancing Security and User Experience

    Sponsored by: iovation, Inc.

    How can you increase authentication security without impacting user experience? Take a closer look at flexible authentication that can help you meet these challenges with global fraud and trust insight, interactive multi-factor authentication, and more.

  • Moving Beyond the Password: Consumers' Views on Authentication

    Sponsored by: iovation, Inc.

    A 2017 Aite Group survey of 1,095 U.S. consumers who use online and/or mobile banking reveals users' perceptions of various forms of authentication. Uncover key findings from this study and expert recommendations to improve authentication security and user experience.

  • How to Achieve End-to-End Authentication

    Sponsored by: iovation, Inc.

    Examine how to overcome top authentication challenges by adapting to different levels of risk in real time. Uncover how you can use this method to respond to different risk scenarios.

  • Making the Move to Dynamic Multifactor Authentication

    Sponsored by: iovation, Inc.

    Passwords. The most hated thing we can't live without. Take a look at new advances in multifactor authentication that can create a more intuitive experience for the end user. Uncover how MFA works, the state of MFA adoption, and 5 reasons to move to a flexible MFA approach.

  • Why a Virtual Browser is Important For Enterprise Security

    Sponsored by: Authentic8, Inc.

    More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.