ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices

    Sponsored by: Lenovo Software

    This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.

  • Are you fully secure? Or are you still using weak authentication methods?

    Sponsored by: RSA Softcat

    This infographic shows you the top 5 ways organizations are using SecurID Access to improve secure sign-ons.

  • 85% of Customers are Dissatisfied with the Authentication Process

    Sponsored by: NICE Systems, Inc

    This infographic reveals what you can do to reduce the burden of authentication for your customers. Learn how to prevent fraud in your contact center, while minimizing interrogation and saving money on every call.

  • Real-Time Voice Authentication at the Call Center

    Sponsored by: NICE Systems, Inc

    Biometrics offers one of the best opportunities to improve security and the customer experience. Discover the advantages of biometric authentication by reducing handle time by 25 to 45 seconds, save significantly in the call center, and more.

  • MINIMIZING THE IDENTITY ATTACK VECTOR WITH CONTINUOUS AUTHENTICATION

    Sponsored by: RSA Softcat

    Continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.

  • Assessing and Sharpening your Security Controls

    Sponsored by: eTECH Channel

    Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.

  • Customer Identity Use Cases: Building a Complete, Contextual Digital Experience

    Sponsored by: Radiant Logic, Inc.

    See how to implement faster authentication with seamless SSO and deploy finer-grained authorization and customized services. Learn about combining these two things to provide your customers with a better digital experience.

  • Simplify Cloud Access and Provisioning with a Federated Identity Service

    Sponsored by: Radiant Logic, Inc.

    Delve into the identity integration issues that arise when enterprises connect to cloud applications. Discover how to overcome the challenges by creating a place to authenticate users, utilize a global reference image to provision to cloud apps, and simplify the management of users and groups.

  • How to Secure Your IAM System

    Sponsored by: Radiant Logic, Inc.

    Discover how to strengthen the security of your IAM system by encrypting data at rest, adding multi-factor authentication, and protecting key accounts.

  • Businesses Should Begin Preparing for the Death of the Password

    Sponsored by: Gigya

    Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.

  • Red Hat Enterprise Linux: Secure Identity Management

    Sponsored by: Red Hat

    Address the challenges of managing identities in Linux or a mixed Linux/Windows environment by centralizing management in one interface. Download this paper to take advantage of Linux's direct integration into your environment to provide host-based access control, and more.

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • Privileged Users

    Sponsored by: Forcepoint

    Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.

  • Securing Access to On-Premise and SaaS Environments with Cloud-based IAM

    Sponsored by: OneLogin

    Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.

  • Putting the “Secure” in Secure Remote Access

    Sponsored by: Citrix

    Security pros today are challenged to establish comprehensive protection for all kinds of remote access use cases. Learn how you can deliver a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.

  • Security Solutions for Mobile Users in the Workplace

    Sponsored by: HID

    This e-book describes the security landscape for mobile devices and how you can improve the user experience on mobile devices while still protecting your assets and managing costs efficiently.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by: SearchSecurity.com

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • In the Market for a New Key Manager? Then Get in on a Good Thing!

    Sponsored by: Gemalto

    Learn four key reasons why you need to switch to a central key manager. Discover how a full portfolio of flexible encryption options that work on-premises, in traditional data centers and virtualized cloud environments.

  • Six steps to control the uncontrollable

    Sponsored by: Microsoft

    Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.

  • Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics

    Sponsored by: Barracuda Networks

    Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.

  • Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk

    Sponsored by: One Identity

    Go in depth and learn what a hash is and how a "pass-the-hash" (PtH) attack can greatly impact your network. Learn how to mitigate these types of attacks with two different strategies.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • Moving Past the Password? Not So Fast

    Sponsored by: SearchSecurity.com

    The password might not be dead but that doesn't mean it's working. This guide looks at how other user authentication methods can supplement it.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.