ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • The Digital Certificate: How It Works, Which to Buy

    Sponsored by: SearchSecurity.com

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

  • Gain Complete Control of Your Digital Ecosystem with PKI

    Sponsored by: Entrust, Inc.

    Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.

  • Keeping the Keys to Your Cloud Future Secure

    Sponsored by: Entrust, Inc.

    Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.

  • Why Digital Business Needs a New Approach to Information Security

    Sponsored by: Entrust, Inc.

    Access this white paper to learn how companies are turning to new identity-centric, security technologies like PKI in order to extend the reach of their digital businesses and remain secure.

  • What Trust Can Mean to Your Enterprise's Cloud Policy

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.

  • Buyer's Guide to Identity and Access Management Solutions

    Sponsored by: IBM

    Organizations now need "threat-aware" identity and access management (IAM) tools, and this buyer's guide can help you find the IAM solution that's right for your organization. Download now for checklists of key features in 5 main areas, and tips for selecting the solution that addresses all of your IAM needs.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Turn IAM from a Roadblock into a Business Enabler

    Sponsored by: IBM

    Learn how to stop the monotony of IAM, and instead turn it into a business enabler. Discover how identity-as-a-service (IDaaS) can help you reduce costs by 60%, onboard SaaS apps faster, and generate access management from a single screen.

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.

  • Give Them Access. NOT a VPN

    Sponsored by: Bomgar Corp.

    Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk.

  • The 7 Step Hack: Thinking Like a Cybercriminal

    Sponsored by: Bomgar Corp.

    Discover how even a VPN secure network can be cracked open in 7 simple steps, leaving your enterprise at the mercy of hackers. Learn how to control, monitor, and mange access to critical systems by privileged users, including third-party vendors, without leaving yourself open to malicious activity.

  • Cloud IAM Buyer's Guide: Which Vendor is Right for You?

    Sponsored by: IBM

    Discover five simple questions you must ask of any potential Identity and Access Management as a Service (IDaaS) vendor to get a fresh look at your options. Learn how to score each vendor to easily compare their strengths and weaknesses.

  • Cloud IAM TCO Assessment: How Much Could You be Saving?

    Sponsored by: IBM

    This guide helps you compare and contrast the TCO of on-premise IAM with cloud-based IAM to effectively show your board the financial differences between the two.

  • 3 Types of Insider Threats to Watch Out For

    Sponsored by: Absolute

    Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.

  • CW ASEAN November 2016

    Sponsored by: SearchSecurity.com

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

  • CW ANZ November 2016

    Sponsored by: SearchSecurity.com

    With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.

  • From IoT to IDoT: Securing the Identity of Things

    Sponsored by: SearchSecurity.com

    With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.

  • Staying Secure in the Cloud Is a Shared Responsibility

    Sponsored by: evident.io

    The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.

  • New Data Classifications Vital to Information Governance and Security

    Sponsored by: STEALTHbits

    In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.

  • User Provisioning Best Practices: Access Recertification

    Sponsored by: STEALTHbits

    User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.

  • When Your IAM Policy Encounters the Internet of Things

    Sponsored by: Unisys

    Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.

  • What are Threat Intelligence Services?

    Sponsored by: Unisys

    To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.

  • How IAM Addresses Unstructured Content Security Risks

    Sponsored by: STEALTHbits

    Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • Crafting an Identity-Based Security Strategy for Cloud

    Sponsored by: Hewlett Packard Enterprise

    IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.