ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Multimedia

  • Smartsheet Uses Microsoft Azure Active Directory

    Sponsored by: Microsoft

    Tune into this video to learn about a service that integrates with Microsoft Azure and Office 365 designed to help people use their company based credentials to access the information that they need.

  • An Inside Look at the Azure Active Directory

    Sponsored by: Microsoft

    In this video, learn about Microsoft's Azure Active Directory from a developer's standpoint and get a glimpse of the new identity features in Visual Studio 2015 that make it easy to secure applications with Azure AD

  • Solidifying Cloud Security

    Sponsored by: Ping Identity Corporation

    This video will show you how Ping Identity's partner Fishnet Security enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency.

  • Don't Write It Down. Eliminate Passwords with Ping Identity

    Sponsored by: Ping Identity Corporation

    This video discusses how you can amend your identity and access management systems to create a single sign-on experience for all your end-users.

  • Multifactor Authentication Security School

    Sponsored by: SearchSecurity.com

    In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.

  • Dynamic User Authentication with SecureAuth Norse and IDC

    Sponsored by: SecureAuth

    In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.

  • Network Evolution University: Unified Wired and Wireless

    Sponsored by: SearchNetworking.com

    In this classroom, you'll learn how enterprise network managers can build a unified access layer for wired and wireless LANs, establish unified network infrastructure to meet the needs of both wired and wireless users, and deploy network discovery and troubleshooting capabilities that span both wired and wireless access networks.

  • Managing BYOD Endpoint Security Classroom

    Sponsored by: SearchSecurity.com

    This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.

  • Enterprise Mobility University: Taking Control of BYOD with MDM Classroom

    Sponsored by: SearchConsumerization.com

    Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.

  • Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing

    Sponsored by: WANdisco

    Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • Preventing Cyber-Attacks with Big Data Security Analytics and SIEM

    Sponsored by: LogRhythm, Inc.

    This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.

  • Mitigating Insider Threats

    Sponsored by: IBM

    This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.

  • Global Security University: IAM Integration Classroom

    Sponsored by: IBM

    This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos, Inc.

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Podcast: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.

  • Closing the Loop for Effective Network Operations Management Webcast

    Sponsored by: Cisco Systems, Inc.

    This webcast explores the need for operational efficiency in the modern enterprise and why network monitoring and management is so vital. View now to uncover details of a portfolio of networking products that can help you with network visibility, troubleshooting, and more!

  • The Authoritative ID Store Is Dead - How Cloud Changes Provisioning

    Sponsored by: Intel

    Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.

  • Advanced Authentication Methods: Software vs Hardware

    Sponsored by: CA Technologies.

    View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Secure Cloud Access Reference Architecture Model

    Sponsored by: Intel

    Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.

  • Cloud Access 360 Overview Video

    Sponsored by: Intel

    Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.

  • Automating User Provisioning: A User’s Perspective

    Sponsored by: Oracle Corporation

    Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.