ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Two-Factor Authentication Protects Health Data

    Sponsored by: VASCO Data Security International

    Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.

  • Next-Gen Autentication

    Sponsored by: SearchSecurity.com

    This Security classroom explores the latest in authentication methods and technologies.

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • A Certified Concern

    Sponsored by: SearchSecurity.com

    Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.

  • Public Key Infrastructure: The New Best Practices

    Sponsored by: Certified Security Solutions (CSS)

    This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.

  • Public Key Infrastructure: Traditional Deployments vs. IoT PKI

    Sponsored by: Certified Security Solutions (CSS)

    This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.

  • Root Out Ransomware

    Sponsored by: SearchSecurity.com

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Gain Complete Control of Your Digital Ecosystem

    Sponsored by: Entrust, Inc.

    Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.

  • Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now

    Sponsored by: IBM

    Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.

  • Your Guide for Identity Governance and Administration

    Sponsored by: IBM

    With the identity governance and administration (IGA) market maturing, many enterprises are beginning their search for an IAM vendor or reevaluating their current partnerships. This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.

  • For Better Access Governance, Look Beyond Roles to

    Sponsored by: IBM

    Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.

  • Cost-Effectively License Enterprise Mobility Cloud Services for All Your Users

    Sponsored by: Microsoft

    A cloud-based enterprise mobility suite (EMS) provides users access to the unified experience that they have come to expect. Inside, learn how an EMS boosts productivity, mobile management, and security measures.

  • Tolly Test Report: Evaluating a Web Protection Vendor

    Sponsored by: IBM

    In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Simplify Your Google Apps Collaboration and Management with IDaaS

    Sponsored by: OneLogin

    This informative webinar is designed to get you through the most complex of Google App deployments.

  • KuppingerCole Report: Access Management and Federation

    Sponsored by: IBM

    Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.

  • The Power of Modern Access Management Tools

    Sponsored by: IBM

    Find out how you can take back control of access management with an integrated platform for web, mobile & cloud in this white paper.

  • Take Back Control of Access Management

    Sponsored by: IBM

    An integrated approach to access management can reduce complexity and thwart security breaches. Access this white paper to learn about the myriad benefits all-in-one access management technology can offer.

  • Fast Track Your Office 365 Deployment and Beyond

    Sponsored by: OneLogin

    Access this informative webinar, featuring EMM industry leader SOTI, to discover hidden Office 365 roadblocks and headaches, how to automate on-and off-boarding of users in real time to achieve both business agility and security, and how SOTI quickly deployed Office 365 and achieved ROI in just one week.

  • IDaaS: Modernize Your IAM in the Cloud

    Sponsored by: OneLogin

    Learn how identity management as a service (IDaaS) can help you modernize your IAM and roll out applications as quickly as possible while ensuring your data is kept secure.

  • 85% of Customers are Dissatisfied with the Authentication Process

    Sponsored by: NICE Systems, Inc

    This infographic reveals what you can do to reduce the burden of authentication for your customers. Learn how to prevent fraud in your contact center, while minimizing interrogation and saving money on every call.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

  • Identity Crisis?

    Sponsored by: SearchSecurity.com

    IAM security policies must take into account the latest technology developments, especially cloud and the internet of things.

  • Customer Identity Use Cases: Building a Complete, Contextual Digital Experience

    Sponsored by: Radiant Logic, Inc.

    See how to implement faster authentication with seamless SSO and deploy finer-grained authorization and customized services. Learn about combining these two things to provide your customers with a better digital experience.

  • Enabling Secure, Customized Identity Management

    Sponsored by: Radiant Logic, Inc.

    Discover how to deliver smarter security and more customized services to your customers. Listen in to see how a common identity service for all constituents can improve security and deliver better services to your customers, while saving time and money in administration.

  • Simplify Cloud Access and Provisioning with a Federated Identity Service

    Sponsored by: Radiant Logic, Inc.

    Delve into the identity integration issues that arise when enterprises connect to cloud applications. Discover how to overcome the challenges by creating a place to authenticate users, utilize a global reference image to provision to cloud apps, and simplify the management of users and groups.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.