ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Why Device Risk is an Essential Element for Your MFA Strategy

    Sponsored by: iovation, Inc.

    Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.

  • Identity Up in the Clouds

    Sponsored by: SailPoint Technologies

    As a result of the increase in cloud usage, many enterprises are facing challenges with running a hybrid environment, most importantly securing their users' access to all these apps. Explore this e-book to uncover how to effectively manage IAM within your cloud environments.

  • Omnichannel Authentication

    Sponsored by: iovation, Inc.

    While the current banking experience is a multichannel approach, which provides fast access, it does not provide a secure, effortless user experience. This resource provides insight into omnichannel authentication within mobile banking to help provide customers a seamless, effortless, high-quality experience, while maintaining security.

  • Who Owns Your Data?

    Sponsored by: SailPoint Technologies

    7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.

  • Understand the State of Identity and Access Management

    Sponsored by: SailPoint Technologies

    IAM continues to fight for priority in organizations' security strategies. This Forrester report outlines budgeting and spending, policies and tools in use, tech adoption plans, and other key IAM trends in enterprise organizations to help security pros assess their own IAM strategy.

  • Stopping the Insider Threat

    Sponsored by: SailPoint Technologies

    Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.

  • Report: IAM Leadership Compass

    Sponsored by: Janrain

    This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.

  • Customer IAM Analysis

    Sponsored by: Janrain

    In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.

  • Customer IAM Analysis

    Sponsored by: Janrain

    In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Key Considerations in Selecting a Customer IAM Solution

    Sponsored by: Janrain

    The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.

  • Report: Customer Identity and Access Management

    Sponsored by: Janrain

    In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.

  • GDPR Security Strategies

    Sponsored by: Oracle

    The GDPR is coming quickly and requires heightened security and compliance with data protection regulations. Take an in-depth look at this webcast to uncover security strategies for GDPR compliance preparation.

  • Top Trends That Will Shape CIAM in 2018 and Beyond

    Sponsored by: Janrain

    In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.

  • Revolutionizing the Sharing Economy

    Sponsored by: Evident

    According to the U.S. Department of Commerce, the sharing economy has the potential to increase to $335 billion by 2025. Take a look at this resource to uncover a security strategy for the sharing economy that can help advance identity and verification while allowing users to securely share personal data.

  • Executive Review: Consumer Identity and Access Management

    Sponsored by: Janrain

    Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.

  • Revolutionizing the Sharing of Personal Data

    Sponsored by: Evident

    The average number of records stolen in a data breach is 24,089, according to IBM Security. This resource provides information into securing personal, sensitive data to minimize the risks of a data hack in order to protect your business.

  • Workspace Tips: Secure identity and mobility management

    Sponsored by: VMware

    Read this white paper to learn tips on how to enable seamless access to apps and data across devices, ensure data on mobile devices remains secure, allow end users to easily log in while maintaining security, and much more.

  • How to Get More Personal Data Without the Risk

    Sponsored by: Evident

    According to Continuum, 3.7 million personal data records are stolen every day. Take an in-depth look at this webinar to gain insight into the worsening security problem facing enterprises today, the concern about safety of personal data, and tips for choosing a verification partner.

  • Fighting Against Authorized Push Payment (APP) Scams

    Sponsored by: HID Global

    This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.

  • How to Avoid Being the Victim of a Data Breach

    Sponsored by: Evident

    There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.

  • The State Of The Digital Workspace

    Sponsored by: VMware

    Download this report to understand the state of the digital workspace and uncover how companies are realizing 150 percent ROI and enabling secure access to all apps in one place on any device.

  • The 7 Challenges to Online Identity Verification

    Sponsored by: Evident

    Lack of trust is the most important hurdle for users of the sharing economy, so providers must deliver security to their users. This white paper provides actionable steps to secure your business to demonstrate your marketplace is a safe place for people to engage.

  • A Risk-Driven Identity And Access Management Process Framework

    Sponsored by: Microsoft

    This Forrester Research report outlines how to use behavior-based trending methods in your identity and access management strategy to reduce security exposures and improve the user experience.

  • The Sharing Economy: Who Will You Trust

    Sponsored by: Evident

    With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.