Research Library

Powered by

Identity Management Research

  • Best Practices For Multi-Factor Authentication

    Sponsored by: Synchronoss

    Learn how multi-factor authentication bolsters security and is exponentially more secure than passwords alone. Discover the fundamental problem with relying on passwords, how to choose a cloud service that meets your industry's guidelines, and more.

  • When Your IAM Policy Encounters the Internet of Things

    Sponsored by: Unisys

    Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.

  • What are Threat Intelligence Services?

    Sponsored by: Unisys

    To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.

  • Best Practices for Secure and Efficient Onboarding and Off-boarding

    Sponsored by: RES Software

    Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.

  • The Current and Future States of Cybersecurity in the Digital Economy: Part 2

    Sponsored by: Unisys

    In part 2 of this 3-part cybersecurity report you will uncover the current trends, the progress made and future challenges of cybersecurity research development, federal IT governance, IAM and more.

  • How IAM Addresses Unstructured Content Security Risks

    Sponsored by: STEALTHbits

    Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.

  • Planning for EMM After Good for Enterprise End of Life

    Sponsored by: vmware airwatch

    Before you defend the enterprise against mobile threats, you need to defend your business case. Uncover a list of important criteria for selecting a more productive, lower TCO, and identity-integrated platform designed for the long-term.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • From IoT to IDoT: Securing the Identity of Things

    Sponsored by:

    With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.

  • Staying Secure in the Cloud Is a Shared Responsibility

    Sponsored by:

    The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.

  • Crafting an Identity-Based Security Strategy for Cloud

    Sponsored by: Hewlett Packard Enterprise

    IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.

  • How one Investment Company Ensures Compliance while Slashing their IT Workload

    Sponsored by: Dell Software

    Dragon Capital was able to audit changes to user access permissions and easily meet its compliance requirements. Learn how this investment firm enabled critical changes in real time, investigate incidents in minutes rather than hours or days, and more.

  • Designing a Multilayered, In-Depth Defense Approach to Authentication

    Sponsored by: Dell Software

    This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Read on to uncover features you should look for in third-party solutions to supplement native security mechanisms.

  • Two-Factor Authentication Protects Health Data

    Sponsored by: VASCO Data Security International

    Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.

  • Next-Gen Autentication

    Sponsored by:

    This Security classroom explores the latest in authentication methods and technologies.

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • A Certified Concern

    Sponsored by:

    Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.

  • Public Key Infrastructure: The New Best Practices

    Sponsored by: Certified Security Solutions (CSS)

    This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.

  • Public Key Infrastructure: Traditional Deployments vs. IoT PKI

    Sponsored by: Certified Security Solutions (CSS)

    This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.

  • 5 Steps to Raising Ransomware Resistance

    Sponsored by:

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Essential Security & Enablement for Your Enterprise

    Sponsored by: Entrust, Inc.

    Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.

  • Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now

    Sponsored by: IBM

    Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.

  • Your Guide for Identity Governance and Administration

    Sponsored by: IBM

    With the identity governance and administration (IGA) market maturing, many enterprises are beginning their search for an IAM vendor or reevaluating their current partnerships. This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.

  • For Better Access Governance, Look Beyond Roles to

    Sponsored by: IBM

    Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.

  • Securing Data Access Within the Healthcare Industry

    Sponsored by: VASCO Data Security International

    Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.