ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Single Secure Credential to Access Facilities and IT Resources

    Sponsored by: HID

    For enterprises, this means securing your premises can be just as important as securing your network. The best software won't prevent loss if a malicious individual gains physical access to your assets. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.

  • 5 Reasons Why Mobile Will Transform Enterprise Authentication

    Sponsored by: Entrust, Inc.

    There is no denying that mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.

  • Accelerating Business Transformation with Effortless Authentication

    Sponsored by: Entrust, Inc.

    In this white paper learn how to attain enterprise-grade authentication and enable bold digital business strategies via foundational security.

  • Hackers Have a Plan to Get to Your Privileged Accounts

    Sponsored by: One Identity

    Gain a detailed walk through of the challenges of managing privileged accounts, and the importance of project planning and getting up-front buy-in from key stakeholders to ensure a successful implementation.

  • The Low hanging fruit of IAM – three fundamental things you should be doing

    Sponsored by: One Identity

    Learn how to address where to begin with IAM and security solutions, how they are multi-layered, and 3 IAM best practices to ensure your enterprise has a strong security posture.

  • 7 Ways Windows 10 Changes the Enterprise

    Sponsored by: vmware airwatch

    Read this new flipbook to unlock insights into the seven game-changing features that make Windows 10 "ready for today's mobile-cloud era" —and how IT can deliver a cloud-first unified approach to modern OS management and security.

  • Matrix42-RS-MyWS-0032-Getting a handle on mobile devices GÇô securely, reliably and tidily (Web)

    Sponsored by: Matrix42

    Learn how to go far beyond the basic options offered by single sign-on and password manager software while at the same time be more user friendly and far less complex than many of the currently available identity and access management options.

  • Webinar: Citrix Ready Security Program for Citrix ShareFile

    Sponsored by: Citrix Ready

    Securing data is critical to every enterprise, but especially so for those deploying cloud- and mobile-based file sync and share. Tune into this webinar on Thursday, March 23rd, 2017 at 9am PST, as experts demonstrate strategic security integrations for your ShareFile data and access.

  • Viewpoints and Vendor Comparisons: Access Management and ID Federation

    Sponsored by: IBM

    In this market report, learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Also gain rare insight into product ratings, vendor coverage, leaders in the field, and more.

  • Third-Party Risk Management: How to Avoid the Dangers of Weak Controls

    Sponsored by: ModoModo

    If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.

  • Protecting and Empowering Your Connected Organization

    Sponsored by: Microsoft

    Identity management, device management, and information protection have drastically changed due to the rise of mobility. Access this e-book to learn how to get the protection you need for your mobile enterprise.

  • How IAM has Evolved on the Cloud: The Good and the Bad

    Sponsored by: IBM

    Learn how IAM has evolved over the years, what has worked well for organizations, and what IAM procedures need to be strengthened to meet future threats.

  • Simplify and Accelerate Identity Protection on The Cloud

    Sponsored by: IBM

    Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM.

  • How to Strengthen Your Identity Infrastructure

    Sponsored by: ExtraHop

    Few things are as essential to organizational health as identity infrastructure, which has greatly increased in importance because of new service models. Learn how to cut complexity and regain control of IT services, including identity systems, by unlocking the hidden value in data flowing through your network.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • A New Paradigm for Identity Assurance

    Sponsored by: RSA

    Learn how to take authentication to the next level. Discover how to determine the risk associated with the action a user is about to take, based on context gathered over time, continuously.

  • The Digital Certificate: How It Works, Which to Buy

    Sponsored by: SearchSecurity.com

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

  • Buyer's Guide to Identity and Access Management Solutions

    Sponsored by: IBM

    Organizations now need "threat-aware" identity and access management (IAM) tools, and this buyer's guide can help you find the IAM solution that's right for your organization. Download now for checklists of key features in 5 main areas, and tips for selecting the solution that addresses all of your IAM needs.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Turn IAM from a Roadblock into a Business Enabler

    Sponsored by: IBM

    Learn how to stop the monotony of IAM, and instead turn it into a business enabler. Discover how identity-as-a-service (IDaaS) can help you reduce costs by 60%, onboard SaaS apps faster, and generate access management from a single screen.

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.

  • Trends in Mobile User Authentication

    Sponsored by: HID

    To keep pace with the escalation of mobile device use, IT departments need to explore new options that provide easy-to use yet highly secure authentication that works across all types of mobile devices. Access this resource to learn how to reduce multiple, complex passwords while enhancing safety and mobile security.

  • Banking Security in Today's Mobile World

    Sponsored by: HID

    This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.

  • Balancing User Productivity and Security

    Sponsored by: RES Software

    Uncover a secure access system your workforce can use to ensure the safety of enterprise data. At the same time, you can ensure that workers aren't hampered by your security systems and can get their work done.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.