ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Why Device Risk is an Essential Element for Your MFA Strategy

    Sponsored by: iovation, Inc.

    Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.

  • Identity Up in the Clouds

    Sponsored by: SailPoint Technologies

    As a result of the increase in cloud usage, many enterprises are facing challenges with running a hybrid environment, most importantly securing their users' access to all these apps. Explore this e-book to uncover how to effectively manage IAM within your cloud environments.

  • The Anatomy of a Data Breach

    Sponsored by: SailPoint Technologies

    43% of the time data breaches are directly caused by insiders, according to SailPoint Technologies. Explore this white paper to gain insight into the anatomy of data breaches through 4 phases to help protect your organization against falling victim to such attacks.

  • Omnichannel Authentication

    Sponsored by: iovation, Inc.

    While the current banking experience is a multichannel approach, which provides fast access, it does not provide a secure, effortless user experience. This resource provides insight into omnichannel authentication within mobile banking to help provide customers a seamless, effortless, high-quality experience, while maintaining security.

  • Who Owns Your Data?

    Sponsored by: SailPoint Technologies

    7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.

  • Understand the State of Identity and Access Management

    Sponsored by: SailPoint Technologies

    IAM continues to fight for priority in organizations' security strategies. This Forrester report outlines budgeting and spending, policies and tools in use, tech adoption plans, and other key IAM trends in enterprise organizations to help security pros assess their own IAM strategy.

  • Stopping the Insider Threat

    Sponsored by: SailPoint Technologies

    Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.

  • Report: IAM Leadership Compass

    Sponsored by: Janrain

    This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.

  • Customer IAM Analysis

    Sponsored by: Janrain

    In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.

  • Customer IAM Analysis

    Sponsored by: Janrain

    In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.

  • Key Considerations in Selecting a Customer IAM Solution

    Sponsored by: Janrain

    The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.

  • GDPR Primer and Readiness Assessment

    Sponsored by: Janrain

    This data sheet provides a GDPR readiness assessment to ensure your organization will achieve compliance by May 2018.

  • Report: Customer Identity and Access Management

    Sponsored by: Janrain

    In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.

  • GDPR Security Strategies

    Sponsored by: Oracle

    The GDPR is coming quickly and requires heightened security and compliance with data protection regulations. Take an in-depth look at this webcast to uncover security strategies for GDPR compliance preparation.

  • Top Trends That Will Shape CIAM in 2018 and Beyond

    Sponsored by: Janrain

    In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.

  • Revolutionizing the Sharing Economy

    Sponsored by: Evident

    According to the U.S. Department of Commerce, the sharing economy has the potential to increase to $335 billion by 2025. Take a look at this resource to uncover a security strategy for the sharing economy that can help advance identity and verification while allowing users to securely share personal data.

  • Executive Review: Consumer Identity and Access Management

    Sponsored by: Janrain

    Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.

  • Revolutionizing the Sharing of Personal Data

    Sponsored by: Evident

    The average number of records stolen in a data breach is 24,089, according to IBM Security. This resource provides information into securing personal, sensitive data to minimize the risks of a data hack in order to protect your business.

  • Fighting Against Authorized Push Payment (APP) Scams

    Sponsored by: HID Global

    This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.

  • The 7 Challenges to Online Identity Verification

    Sponsored by: Evident

    Lack of trust is the most important hurdle for users of the sharing economy, so providers must deliver security to their users. This white paper provides actionable steps to secure your business to demonstrate your marketplace is a safe place for people to engage.

  • The Sharing Economy: Who Will You Trust

    Sponsored by: Evident

    With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.

  • Credential Stuffing a Security Epidemic

    Sponsored by: F5 Networks

    81% of hacking-related breaches include leveraging of usernames and passwords, according to the 2017 Verizon DBIR. This e-book provides insight into credential stuffing attacks as well as a guide to stopping credential theft.

  • How Malware Can Steal Your Data

    Sponsored by: F5 Networks

    51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.

  • How Can Privileged Access Accounts Be Managed in Large Companies?

    Sponsored by: One Identity

    According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.

  • How can organizations get control over privileged identity management?

    Sponsored by: One Identity

    Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.