ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Information Security magazine Insider Edition, April 2017

    Sponsored by: SearchSecurity.com

    Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools.

  • 3 Common Password Policy Mistakes

    Sponsored by: Specops Software

    Most organizations don't have adequate password policy requirements. Take a look at the 3 common password policy mistakes that your organization might be making.

  • Are PCI Compliant Passwords Good Enough?

    Sponsored by: Specops Software

    Learn what your business can do to make data more secure and be compliant with PCI. Discover tools and best practices that enhance password definition criteria.

  • Deploying OpenShift container platform 3 on Google cloud platform

    Sponsored by: Red Hat

    This guide dives into an in-depth example demonstrating how OpenShift Container Platform 3 can be set up to take advantage of the native high availability capabilities of Kubernetes in order to create a highly available OpenShift Container Platform 3 environment.

  • Compliance and Beyond: Future-Proofing Your Password Policy

    Sponsored by: Specops Software

    This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.

  • Managing Access and Identity in the Cloud Age

    Sponsored by: TechTarget

    Cloud identity and access management (IAM) can simplify the complex tasks of managing user identities and permissions, but moving identity stores to the cloud also raises security concerns. Our brand new handbook, Locking up the Cloud with IAM, explores these issues further.

  • Your Guide to Trends in Mobile User Authentication

    Sponsored by: HID

    As mobile devices play a greater role in corporate computing and employees become more reliant on them, new security challenges emerge and existing ones become more complex. Access this white paper to discover how the risk of unauthorized access to mobile devices adds new requirements for user authentication.

  • Single Secure Credential to Access Facilities and IT Resources

    Sponsored by: HID

    Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.

  • 5 Reasons Why Mobile Will Transform Enterprise Authentication

    Sponsored by: Entrust, Inc.

    Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.

  • Accelerating Business Transformation with Effortless Authentication

    Sponsored by: Entrust, Inc.

    In this white paper learn how to attain enterprise-grade authentication and enable bold digital business strategies via foundational security.

  • Hackers Have a Plan to Get to Your Privileged Accounts

    Sponsored by: One Identity

    Gain a detailed walk through of the challenges of managing privileged accounts, and the importance of project planning and getting up-front buy-in from key stakeholders to ensure a successful implementation.

  • The Low hanging fruit of IAM – three fundamental things you should be doing

    Sponsored by: One Identity

    Learn how to address where to begin with IAM and security solutions, how they are multi-layered, and 3 IAM best practices to ensure your enterprise has a strong security posture.

  • Viewpoints and Vendor Comparisons: Access Management and ID Federation

    Sponsored by: IBM

    In this market report, learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Also gain rare insight into product ratings, vendor coverage, leaders in the field, and more.

  • Third-Party Risk Management: How to Avoid the Dangers of Weak Controls

    Sponsored by: ModoModo

    If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.

  • Protecting and Empowering Your Connected Organization

    Sponsored by: Microsoft

    Identity management, device management, and information protection have drastically changed due to the rise of mobility. Access this e-book to learn how to get the protection you need for your mobile enterprise.

  • How IAM has Evolved on the Cloud: The Good and the Bad

    Sponsored by: IBM

    Learn how IAM has evolved over the years, what has worked well for organizations, and what IAM procedures need to be strengthened to meet future threats.

  • Simplify and Accelerate Identity Protection on The Cloud

    Sponsored by: IBM

    Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • A New Paradigm for Identity Assurance

    Sponsored by: RSA

    Learn how to take authentication to the next level. Discover how to determine the risk associated with the action a user is about to take, based on context gathered over time, continuously.

  • Buyer's Guide to Identity and Access Management Solutions

    Sponsored by: IBM

    Organizations now need "threat-aware" identity and access management (IAM) tools, and this buyer's guide can help you find the IAM solution that's right for your organization. Download now for checklists of key features in 5 main areas, and tips for selecting the solution that addresses all of your IAM needs.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Turn IAM from a Roadblock into a Business Enabler

    Sponsored by: IBM

    Learn how to stop the monotony of IAM, and instead turn it into a business enabler. Discover how identity-as-a-service (IDaaS) can help you reduce costs by 60%, onboard SaaS apps faster, and generate access management from a single screen.

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.

  • Trends in Mobile User Authentication

    Sponsored by: HID

    To keep pace with the escalation of mobile device use, IT departments need to explore new options that provide easy-to use yet highly secure authentication that works across all types of mobile devices. Access this resource to learn how to reduce multiple, complex passwords while enhancing safety and mobile security.

  • The Digital Certificate: How It Works, Which to Buy

    Sponsored by: SearchSecurity.com

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.