ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Rackspace Best Practices for AWS: Identity Management, Auditing & Billing

    Sponsored by: Rackspace

    This webinar provides guidelines for the AWS user account, identity and access management, consolidated billing, as well as best practices for usage patterns, and more.

  • A Comprehensive, Innovative Approach to Mobile Security

    Sponsored by: Unisys

    Because of new mobile threat vectors, security at the device-level is no longer enough. Discover how to strengthen your mobile endpoints from the inside-out with software-defined security, securing mobile data along the entire path to the destination server.

  • Securing Access to On-Premise and SaaS Environments with Cloud-based IAM

    Sponsored by: OneLogin

    Locking down your Identity and Access Management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about Identity and Access Management (IAM) technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Security Solutions for Mobile Users in the Workplace

    Sponsored by: HID

    This e-book describes the security landscape for mobile devices and how near field communications can improve the user experience on mobile devices while allowing companies to protect their assets and manage costs efficiently.

  • An Operational Model for Breach Analytics and Intelligence

    Sponsored by: Anomali

    In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.

  • Battling fraud at the root cause

    Sponsored by: IBM

    Battling malware-driven fraud requires real-time, adaptable and transparent solutions for prevention, detection, mitigation and remediation that span every point of your interaction. Discover how cybercriminals circumvent security measures at each stage of the transaction lifecycle and learn strategies to combat these attacks.

  • The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works

    Sponsored by: HID

    In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.

  • vanGO® One-2-One™ Personalized Security

    Sponsored by: HID

    With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.

  • Quick Steps to Integrate Office 365 and ZixGateway® Hosted

    Sponsored by: ZixCorp

    Add greater protection emails by routing Office 365 to ZixGateway Hosted. It automatically scans routed outbound email from Office 365 connectors. If sensitive information triggers Zix content policies, those messages and their attachments are automatically encrypted.

  • HBR paper: The Danger from Within

    Sponsored by: Dimension Data

    The biggest threat to enterprise security is the people organizations hire and fire. Read this article from the Harvard Business Review, "Danger from Within" to learn why the number of insider cyberattacks is growing and what are 5 ways to tackle the problem.

  • Build a common identity profile and hub out of disparate identity sources

    Sponsored by: Radiant Logic, Inc.

    Discover how to renew your existing IAM investments, making them a strategic infrastructure solution that supports current identity needs and adapts quickly to future requirements as they arise.

  • Moving Past the Password? Not So Fast

    Sponsored by: SearchSecurity.com

    The password might not be dead but that doesn't mean it's working. This guide looks at how other user authentication methods can supplement it.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Unified Identity Governance - A Business Overview

    Sponsored by: Oracle Corporation

    Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.

  • Enterprise Mobile Management

    Sponsored by: IBM MaaS360

    Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.

  • A Comprehensive, Innovative Approach to Cloud Security

    Sponsored by: Unisys

    The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.

  • Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems

    Sponsored by: Unisys

    Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.

  • Securing Office 365 with Symantec

    Sponsored by: Symantec Corporation

    How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Reaping the Benefits of Strong, Smarter User Authentication

    Sponsored by: Symantec Corporation

    Discover how the changes in enterprise IT—namely mobility and cloud—affect smart authentication implementation. Access now to learn how you can remain secure against today's evolving security threats with smarter user authentication.

  • Modernizing Active Directory for Azure and Office 365

    Sponsored by: Dell Software

    This white paper highlights best practices for modernizing and integrating your in-premises AD into Azure so that you can enjoy less administration of on-premises hardware and software and introduce your organization to identity as a service.

  • Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk

    Sponsored by: Dell Software

    Go in depth and learn what a hash is and how a PtH attack can greatly impact your network. Learn how to mitigate these types of attacks with Privileged Password Manager and Privileged Session Manager.

  • Identity and Access Management for the Real World: The Fundamentals

    Sponsored by: Dell Software

    This e-book discusses the most pressing IAM issues faced by most organizations and offers actionable and sustainable approaches to the IAM challenges you encounter. Access now to learn what IAM for the real world can and should look like.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.