ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments

    Sponsored by: CA Technologies.

    This white paper highlights a solution for privileged credential management that drives IT risk reduction and operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Read on to discover how this platform can allow your enterprise to protect and manage all your credentials.

  • How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

    Sponsored by: CA Technologies.

    This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.

  • Layered Security Strategies for a Mobile-First World

    Sponsored by: Microsoft

    This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.

  • Best Practices for Securing Privileged Identities

    Sponsored by: CA Technologies

    Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.

  • Break the Kill Chain: Stop Data Breaches

    Sponsored by: CA Technologies.

    Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.

  • Break the Kill Chain: Stop Data Breaches

    Sponsored by: CA Technologies

    Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.

  • Context-Aware, Dynamic Access Control

    Sponsored by: Cryptzone

    This brief resource outlines how security pros need to take a dynamic approach to secure network access. Read on to learn about a new platform that considers both context and identity to grant access to your network, and see if it's right for your business.

  • A Guide to Protecting your Critical Assets with Identity Governance

    Sponsored by: IBM

    In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.

  • How Identity Governance Became a Key Compliance and Risk Control

    Sponsored by: IBM

    In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.

  • Customer Success Story: Unisys Video Case Study

    Sponsored by: SecureAuth

    This case study details how one company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.

  • Eliminating the Drawbacks of Distributed SaaS Provider Identity

    Sponsored by: F5 Networks

    In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.

  • Deploy an Enterprise Mobility Gateway to Optimize Access Control

    Sponsored by: F5 Networks

    In this white paper, you will learn how to scale, secure, and optimize control of your anytime, anywhere network, cloud, and application access. Read this paper to securely manage your workforce mobility and unburden your IT department and learn how to deliver seamless user access to all web-based resources.

  • How to Stop Cyber Attacks Using Adaptive Authentication

    Sponsored by: SecureAuth

    This informative webinar takes a look at how next generation adaptive authentication so that you can stay a step ahead of criminals. Tune in to learn how you can easily identify suspicious actors before they enter your network, not after they violate a policy.

  • What to Expect in 2016: Top 5 Predictions for Security and Access Control

    Sponsored by: SecureAuth

    This informative webinar outlines the top 5 identity and access management trends for 2016. Tune in to learn what's on the horizon for IAM and take a closer look at next generation adaptive authentication so that you can stay a step ahead of the bad guys.

  • Kelsey Seybold Clinic Case Study

    Sponsored by: SecureAuth

    This case study details how one healthcare company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.

  • The Top 5 Tasks to Automate for Privileged Account Management and Security

    Sponsored by: Thycotic

    In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage, and learn how to automate SSH key management, compliance reporting, and more.

  • SecureAuth - Houston Methodist

    Sponsored by: SecureAuth

    In this video, you will learn how to quickly and easily secure your authentication process for your employees to access both existing and new technologies. Move your business into the cloud with confidently and securely.

  • Unisys Case Study

    Sponsored by: SecureAuth

    In this video, you will learn about a simple solution to secure your cloud access. Eliminate soft and hard FOB usage and strengthen your security process.

  • Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare

    Sponsored by: SecureAuth

    In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.

  • Using Identity to Create Next Generation, Risk-based Access Management

    Sponsored by: SecureAuth

    In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.

  • Evaluating Standout Services in the Cloud Identity and Access Management Sector

    Sponsored by: SecureAuth

    If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.

  • The Crucial Security Role of a Cloud Directory

    Sponsored by: Microsoft

    In this webcast, independent analyst and blogger Jack Madden takes a closer look at how a cloud directory can play a crucial security role in user and identity management for mobile and beyond.

  • Case Study: National Healthcare Provider Secures Office 365

    Sponsored by: Palerra Inc.

    In this white paper, review how one of the largest national healthcare providers in the U.S. filled in Office 365 and cloud security gaps and adhere to regulatory requirements.

  • The Challenge of Keeping IAM Simple

    Sponsored by: Thycotic

    This expert e-guide presents the individual challenges the 4 key IAM roles face as they work to mitigate identity fraud/theft. Continue reading to learn why previous IAM projects have failed and how you can overcome the many challenges your organization faces to simplify your IAM approach.

  • Privileged Account Management Security Action Plan

    Sponsored by: Thycotic

    This white paper explains why your organization cannot continue operating without privileged account management as the risks for a crippling data breach skyrocket each day without it. View now to learn the challenges of privileged account management and what you can do to overcome them to improve security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.