ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Trends in Mobile User Authentication

    Sponsored by: HID

    Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.

  • Banking Security in Today's Mobile World

    Sponsored by: HID

    This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now.

  • Give Them Access. NOT a VPN

    Sponsored by: Bomgar Corp.

    Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, mobile banking is more vulnerable than ever. Learn the evolution of strong authentication in online banking and what factors you should look for to balance security and convenience.

  • The 7 Step Hack: Thinking Like a Cybercriminal

    Sponsored by: Bomgar Corp.

    Discover how even a VPN secure network can be cracked open in 7 simple steps, leaving your enterprise at the mercy of hackers. Learn how to control, monitor, and mange access to critical systems by privileged users, including third-party vendors, without leaving yourself open to malicious activity.

  • Balancing User Productivity and Security

    Sponsored by: RES Software

    Uncover a secure access system your workforce can use to ensure the safety of enterprise data. At the same time, you can ensure that workers aren't hampered by your security systems and can get their work done.

  • Dynamic Security Management for a Productive Mobile Workforce

    Sponsored by: RES Software

    This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.

  • Biometrics: A Modern Method Of Authentication

    Sponsored by: Comarch

    Get a thorough understanding of biometrics and how it can serve as an effective method of user authentication for your organization's security strategy.

  • New Data Classifications Vital to Information Governance and Security

    Sponsored by: STEALTHbits

    In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.

  • Cloud IAM Buyer's Guide: Which Vendor is Right for You?

    Sponsored by: IBM

    Discover five simple questions you must ask of any potential Identity and Access Management as a Service (IDaaS) vendor to get a fresh look at your options. Learn how to score each vendor to easily compare their strengths and weaknesses.

  • Cloud IAM TCO Assessment: How Much Could You be Saving?

    Sponsored by: IBM

    This guide helps you compare and contrast the TCO of on-premise IAM with cloud-based IAM to effectively show your board the financial differences between the two.

  • User Provisioning Best Practices: Access Recertification

    Sponsored by: STEALTHbits

    User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.

  • 3 Types of Insider Threats to Watch Out For

    Sponsored by: Absolute

    Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.

  • CW ASEAN November 2016

    Sponsored by: SearchSecurity.com

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

  • CW ANZ November 2016

    Sponsored by: SearchSecurity.com

    With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.

  • The Mobility Quandary: Balancing Mobile Workforce Productivity with Security

    Sponsored by: VMware

    According to a recent report, nearly one quarter of respondent cloud- and mobile-based organizations are experiencing difficulties with identity access management (IAM.) Learn how to enforce granular access controls to tightly manage who gets access to what apps and data in a mobile environment.

  • User and Entity Behavior Analytics and Adaptive Response

    Sponsored by: Preempt Security

    The majority of confirmed data breaches involved attackers posing as legitimate users or users maliciously wielding their access. Learn how to go beyond user and entity behavior analytics with proactive measures to preempt potential insider threats or breaches.

  • Case Study: WCA Hospital Eliminates Dual Prescribing Workflows and Increases Patient Satisfaction

    Sponsored by: Imprivata

    Learn how WCA Hospital implemented EPCS in order to improve their patient's experience with prescriptions, eliminate dual prescribing workflows, and improve provider satisfaction.

  • Best Practices For Multi-Factor Authentication

    Sponsored by: Synchronoss

    Learn how multi-factor authentication bolsters security and is exponentially more secure than passwords alone. Discover the fundamental problem with solely relying on passwords, how to choose a cloud service that meets your industry's guidelines, and more.

  • Best Practices for Secure and Efficient Onboarding and Off-boarding

    Sponsored by: RES Software

    Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.

  • Protecting Critical Assets from Unauthorized Access

    Sponsored by: IBM

    Learn how identity and access management is at the heart of every cybersecurity strategy. Uncover how to safeguard mobile, cloud and social access; prevent advanced insider threats; simplify cloud integrations and identity silos; and more.

  • How IAM Addresses Unstructured Content Security Risks

    Sponsored by: STEALTHbits

    Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • When Your IAM Policy Encounters the Internet of Things

    Sponsored by: Unisys

    Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.

  • What are Threat Intelligence Services?

    Sponsored by: Unisys

    To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.