ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • macOS Security Checklist

    Sponsored by: JAMF

    The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.

  • Access Management Handbook

    Sponsored by: Gemalto

    When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.

  • A Tactical Guide to Finding the Right IDaaS Provider

    Sponsored by: Simeio

    The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.

  • Are You Sure You Didn't Authorize Someone You Shouldn't Have?

    Sponsored by: HID

    Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.

  • Simplify Authentication with Personal Identity Verification

    Sponsored by: HID

    It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.

  • Black Hat Survey 2017

    Sponsored by: Thycotic

    At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.

  • The Pitfalls and Promises of Authentication in the IoT

    Sponsored by: iovation, Inc.

    Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.

  • Protecting the Keys to Your Kingdom

    Sponsored by: Thycotic

    In this white paper, take an in-depth dive into privileged account management in order to ensure that employees only have the permissions they need for the job – not ones that make you vulnerable.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences

    Sponsored by: NICE Systems, Inc

    Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.

  • PASSIVE Voice Biometrics in ACTIVE Channels

    Sponsored by: NICE Systems, Inc

    Learn about the evolution of active vs. passive voice biometrics (VB) and how they combine with other speech processing technologies like automated speech recognition (ASR) to improve authentication and identity assertion in tandem with machine learning and AI.

  • Demo: Secure Browsing in the Cloud

    Sponsored by: Authentic8, Inc.

    Is your browser vulnerable to web-borne threats? Tune into this brief demo to get an inside look at a secure, virtual browser that runs in the cloud.

  • 5 Strategies to Improve Your Security Posture

    Sponsored by: Citrix

    Reducing business security risk, protecting sensitive customer data, and ensuring compliance with regulations and standards are priorities for all organizations. Explore 5 ways you can overcome these security challenges.

  • 80/20: The New and Not-So New World of OT and IoT Security

    Sponsored by: Atos

    This white paper explores the new environments of operational technology (OT) and the Internet of Things (IoT), acknowledging the risks within, with proven security tools and practices. Learn how to use the new 80/20 rule to navigate and simplify OT and IoT into manageable segments.

  • Overcome Authentication Challenges: Balancing Security and User Experience

    Sponsored by: iovation, Inc.

    How can you increase authentication security without impacting user experience? Take a closer look at flexible authentication that can help you meet these challenges with global fraud and trust insight, interactive multi-factor authentication, and more.

  • Moving Beyond the Password: Consumers' Views on Authentication

    Sponsored by: iovation, Inc.

    A 2017 Aite Group survey of 1,095 U.S. consumers who use online and/or mobile banking reveals users' perceptions of various forms of authentication. Uncover key findings from this study and expert recommendations to improve authentication security and user experience.

  • How to Achieve End-to-End Authentication

    Sponsored by: iovation, Inc.

    Examine how to overcome top authentication challenges by adapting to different levels of risk in real time. Uncover how you can use this method to respond to different risk scenarios.

  • Making the Move to Dynamic Multifactor Authentication

    Sponsored by: iovation, Inc.

    Passwords. The most hated thing we can't live without. Take a look at new advances in multifactor authentication that can create a more intuitive experience for the end user. Uncover how MFA works, the state of MFA adoption, and 5 reasons to move to a flexible MFA approach.

  • Dynamic Authentication

    Sponsored by: iovation, Inc.

    It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.

  • How LepideAuditor Helps You Detect and Prevent Privilege Abuse

    Sponsored by: Lepide Software

    Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.

  • How to Track Privileged Users' Activities in the Active Directory

    Sponsored by: Lepide Software

    Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities.

  • How LepideAuditor Helps You Detect and Prevent Insider Threats

    Sponsored by: Lepide Software

    Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.

  • AI, Risk-Based and Context: Trading in Your Password for the Intelligent Future

    Sponsored by: Crossmatch

    Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.

  • Getting Started with Cloud IAM Services

    Sponsored by: OneLogin

    In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.

  • Passwords are Out: But What's Replacing Them?

    Sponsored by: Crossmatch

    Join experts Keven Beaver and Jeff Carpenter in this webcast as they discuss why passwords are obsolete and what the "human-proofed" future of authentication will look like.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.