ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Moving Past the Password? Not So Fast

    Sponsored by: SearchSecurity.com

    The password might not be dead but that doesn't mean it's working. This guide looks at how other user authentication methods can supplement it.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Unified Identity Governance - A Business Overview

    Sponsored by: Oracle Corporation

    Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.

  • Enterprise Mobile Management

    Sponsored by: IBM MaaS360

    Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.

  • A Comprehensive, Innovative Approach to Cloud Security

    Sponsored by: Unisys

    The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.

  • Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems

    Sponsored by: Unisys

    Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.

  • Securing Office 365 with Symantec

    Sponsored by: Symantec Corporation

    How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Reaping the Benefits of Strong, Smarter User Authentication

    Sponsored by: Symantec Corporation

    Discover how the changes in enterprise IT—namely mobility and cloud—affect smart authentication implementation. Access now to learn how you can remain secure against today's evolving security threats with smarter user authentication.

  • Modernizing Active Directory for Azure and Office 365

    Sponsored by: Dell Software

    This white paper highlights best practices for modernizing and integrating your in-premises AD into Azure so that you can enjoy less administration of on-premises hardware and software and introduce your organization to identity as a service.

  • Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk

    Sponsored by: Dell Software

    Go in depth and learn what a hash is and how a PtH attack can greatly impact your network. Learn how to mitigate these types of attacks with Privileged Password Manager and Privileged Session Manager.

  • Identity and Access Management for the Real World: The Fundamentals

    Sponsored by: Dell Software

    This e-book discusses the most pressing IAM issues faced by most organizations and offers actionable and sustainable approaches to the IAM challenges you encounter. Access now to learn what IAM for the real world can and should look like.

  • How HIPAA Compliance is Impossible without Privileged Management

    Sponsored by: Dell Software

    Achieving compliance with data security standards requires you to mitigate the risk of privileged access – in healthcare and other industries. Access this white paper now to learn how you can implement proven strategies to achieve regulatory compliance while fighting against other risks.

  • How a German Utilities Company Embraced Secure Profile Management

    Sponsored by: VMware

    This infographic shows how one German company overcame its cumbersome profile management practices, enhancing end-user experience and security in the process.

  • A Computer Weekly Buyer's Guide to Access Control

    Sponsored by: ComputerWeekly.com

    In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.

  • Security essentials for CIO's enabling mobility - their device, your data

    Sponsored by: IBM

    This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.

  • Key steps to securing data and maintaining proper access

    Sponsored by: IBM

    This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.

  • Federated Access Management: The New Era of Secure Access

    Sponsored by: Ping Identity Corporation

    This white paper teaches you about the evolution of access management and what's driving modern access security requirements. Continue reading to learn about Federated Access Management and discover painless migration strategies to adopt this new breed of access management.

  • Designing Single Sign-On Architecture for Enhanced Security

    Sponsored by: CA Technologies

    This white paper describes how single sign-on and session management, across a wide variety of sites using host-only cookies, can make their theft much more difficult by using a centralized star topology. Access now and discover more benefits to this method.

  • The Key to Protecting Your Business Amid Cybercrime’s Current Boom

    Sponsored by: CA Technologies

    This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.

  • Defending Hybrid Enterprises from Data Breaches and Insider Threats

    Sponsored by: CA Technologies

    Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.

  • Secure Data in the Cloud with AWS Identity and Access Management

    Sponsored by: Radiant Logic, Inc.

    Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.

  • Using Splunk to Manage AWS: Gaining Transparency into Cloud Computing

    Sponsored by: Splunk

    This webcast explores how FINRA, the Financial Industry Regulatory Authority, adopted a cloud services platform with an identity access management feature along with a data management platform to improve the security of their data. Watch now to find out how they were able to reduce costs of their infrastructure.

  • A Buyer's Guide to Identity Integration Solutions

    Sponsored by: Radiant Logic, Inc.

    A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.