ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD

    Sponsored by: TechTarget Security

    Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.

  • The Threat Within: The Case for Zero Trust Access Control

    Sponsored by: Xceedium

    It's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.

  • Enterprise Single Sign On

    Sponsored by: tools4ever

    With organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.

  • Simplify SSL Certificate Management Across the Enterprise

    Sponsored by: Symantec Corporation

    Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.

  • Simplifying and Securing Group Policy Management

    Sponsored by: Dell Software

    Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.

  • Applications and best practices to keep your mobile devices secure

    Sponsored by: TechTarget Security

    Uncover best practices for keeping your mobile devices and applications secure.

  • Protecting Corporate Data in the "BYOD" Environment

    Sponsored by: Apperian, Inc.

    While BYOD offers many benefits to your business, it is imperative that you insure the integrity of your corporate assets.

  • Best Practices for mobile authentication

    Sponsored by: TechTarget Security

    Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.

  • Presentation Transcript:From Wow to How 2: Virtual Desktops, Networking and the Cloud

    Sponsored by: Citrix and Microsoft

    Learn about the various capabilities of virtual desktops beyond just VDI. Discover what role cloud computing plays in today’s enterprises and find out how to authorize desktop users from a single point of authentication.

  • Understanding, Building and Securing an IAM Cloud Architecture

    Sponsored by: OneLogin

    This presentation transcript will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.

  • Securing Network Access for Guests and Contractors

    Sponsored by: Bradford Networks

    This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.

  • Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements

    Sponsored by: StrikeForce Technologies

    Discover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.

  • IT in Europe: Breaking the Code: Are passwords destined for obscurity?

    Sponsored by: TechTarget ComputerWeekly.com 

    This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.

  • Securing Microsoft Exchange 2010 with VeriSign Authentication Services

    Sponsored by: VeriSign EMEA

    This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).

  • Top 10 Tips to Make Access to SaaS, Enterprise Class Secure

    Sponsored by: Intel

    In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.

  • The Authoritative ID Store Is Dead - How Cloud Changes Provisioning

    Sponsored by: Intel

    Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.

  • Adaptive Strong Auth & Federated SSO - The New Power Couple

    Sponsored by: Intel

    Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.

  • E-Guide: Are 'strong authentication' methods strong enough for compliance?

    Sponsored by: TechTarget Security

    Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.

  • Securing the enterprise application layer: Expert Guidelines

    Sponsored by: TechTarget Security

    If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.

  • The Token is Dead. Long Live the Token

    Sponsored by: SafeNet, Inc.

    View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost

  • Securely Publish and Manage Web APIs with CloudControl

    Sponsored by: Layer 7 Technologies

    Cloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs.

  • Choosing a Cloud Provider with Confidence

    Sponsored by: GeoTrust, Inc.

    In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.

  • E-Guide: Preventing and detecting security vulnerabilities in Web applications

    Sponsored by: TechTarget Security

    The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.

  • GlobalSCAPE’s Cloud-based Managed File Transfer Solution Helps AVI-SPL Streamline Global Operations

    Sponsored by: Globalscape

    In this case study you will learn how GlobalSCAPE's cloud-based manged file transfer solution was able to help one business tremendously. Not only will you get insight into the different benefits of the solution, but you will also find out why GlobalSCAPE comes highly recommended due to customer service as well.

  • Building the Right Mobile Security Toolkit

    Sponsored by: TechTarget Security

    Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.