ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Why Banks Need a Dedicated Mobile Banking Security System

    Sponsored by: HID Global

    According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals frequently asked questions by consumers regarding mobile security.

  • 3 Types of SSL Certificates

    Sponsored by: HID Global

    Are you making the right choice when it comes to your SSL certificate? Take a look at this resource to gain insight into 3 types of SSL certificates to see if you are making the right choice specific to your business.

  • What is Multi-factor Authentication?

    Sponsored by: HID Global

    Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.

  • Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?

    Sponsored by: Simeio

    When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.

  • Identity of Things: The Role of Identity Management in the IoT

    Sponsored by: Amido

    Identity and Access Management (IAM) has become a core platform. According to IDG, 91% of IT Managers are seeing identity management as a key enabler for their digital business initiatives. Learn why IAM is evolving with the Internet of Things (IoT), and how to ensure your digital business is built on a firm foundation of identity.

  • Digital Transformation: How Identity Impacts Customer Relationships

    Sponsored by: Amido

    Your customers expect to be able to use multiple devices to interact with your business. As a result, identity is becoming a cornerstone of digital transformation initiatives. How can you bring identity into the mix and better serve your customers on their terms? Find out inside.

  • New Cybersecurity Regulations Adopted to Protect Financial Systems & Information

    Sponsored by: HID Global

    According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.

  • AWS Security Best Practices

    Sponsored by: Amazon Web Services

    Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.

  • AWS Key Management Service Best Practices

    Sponsored by: Amazon Web Services

    This white paper details how you can use the AWS Key Management Service to protect sensitive information across 5 core areas, including identity and access management, detective control, and more.

  • A Solution for Managing Privileged Access

    Sponsored by: Devolutions

    For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.

  • Anatomy of a Privileged Account Hack

    Sponsored by: Thycotic

    Cybersecurity affects more than 3.6 billion internet users worldwide and 80% of hackers say humans are the most responsible. Many IT users lack the understanding of privileged accounts. Inside this white paper uncover how outside attackers or malicious insiders can exploit vulnerabilities and find steps to the anatomy of a privileged account hack.

  • What is Cloud Access Management and Who Needs It?

    Sponsored by: Gemalto

    Inside, learn how a cloud access management program can ensure the right people have access to the right applications at the correct level of trust. Then discover the 4 benefits you can reap from having such a program in place.

  • Confidence to Innovate

    Sponsored by: Dell India

    What are the benefits of complete visibility and control over your security environment? This resource explains the importance of connecting the 4 foundational functions of IT security to enable organizations to adapt rapidly to changing threats, regulations and new technologies.

  • Gemalto Wades Deeper into IDaaS Waters with Adaptive Access Controls for Cloud Resources

    Sponsored by: Gemalto

    Authentication and access controls typically present a tradeoff between security and convenience. This white paper keys into how Gemalto SafeNet offers 3 core functions each time a user attempts to access on-premises or cloud resources.

  • Synchronized Security: Best-of-breed defense that's more coordinated than attacks

    Sponsored by: Sophos, Inc.

    Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.

  • The Truth about Single Sign-on

    Sponsored by: One Identity

    Single sign-on (SSO) is the most visible part of identity and access management (IAM). Take a look at this white paper to tackle 5 common myths about SSO, and identify key questions you should ask in order to find the best approach to IAM and SSO for your organization.

  • SWIFT Security Controls to be Mandatory by 2018

    Sponsored by: CyberArk Software, Inc

    Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.

  • Securely Managing your UNIX Environment

    Sponsored by: One Identity

    Take a look at this white paper to uncover how IAM challenges within UNIX can be overcome with the right practices and tools.

  • VPN Access Made Easier Without Sacrificing Security

    Sponsored by: HID Global

    VPNs create a secure tunnel between company data and employee devices, however they don't protect against weak passwords. Access this resource to learn how to increase the security of the VPN and maintain usability.

  • Creating Trust as Mobile Banking Fraud Escalates

    Sponsored by: HID Global

    Take a closer look at this white paper to uncover security risks mobile bankers are facing and what banks can do to create trust in mobile transactions

  • Single Sign-on for SAP Solution-based Environments

    Sponsored by: One Identity

    Authentication Services from One Identity enables many non-Windows systems – including SAP solutions – to participate as "full citizens" in Active Directory, making SSO a reality. Take a look at this white paper to uncover security benefits provided by authentication services.

  • Extending Native Active Directory Capabilities to Unix and Linux

    Sponsored by: One Identity

    As enterprises become more complex, involving multiple operating systems, the challenges of identity management also become greater. Take a closer look at this white paper to explore how you can simplify identity management across multiple operating systems.

  • Trusted Identities: Solving Fraud in Banking

    Sponsored by: HID Global

    One of the biggest challenges facing banks today is how to provide secure and trusted services while substantially improving customer experience. Take a closer look at this white paper to reveal a holistic multi-channel identity and access management platform that can improve the user experience and create a higher level of mutual trust.

  • ActivID Authentication Appliance for Enterprise

    Sponsored by: HID Global

    While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.

  • Managing Access to Keep Privileged Users' Credentials Secure

    Sponsored by: SearchSecurity.com

    Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.