ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access ControlMultimedia

  • Rackspace and NetIQ - A Success Story

    Sponsored by: NetIQ

    This webcast features one organization's experience with a streamlined identity and access management (IAM) solution that simplifies user provisioning across physical and virtual infrastructures.

  • Chalk Talk: NetIQ Cloud Access

    Sponsored by: NetIQ

    This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.

  • Podcast: Setting the Groundwork for IAM in the Cloud

    Sponsored by: OpenIAM

    This podcast will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.

  • Setting the Groundwork for IAM in the Cloud

    Sponsored by: OpenIAM

    This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.

  • Demo: Easy-to-use OpenIAM Identity and Access Management

    Sponsored by: OpenIAM

    View this webcast for a demonstration on how to use a fully-integrated IAM platform that offers self-service, user lifecycle management, provisioning, and single sign-on (SSO) capabilities

  • Mitigating Insider Threats

    Sponsored by: IBM

    This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.

  • IBM Identity and Access Management

    Sponsored by: IBM

    View this informative video to learn more about how your employees can access information from any location. It explains what you can do to improve security and ensure your information is safe, even in the fast-paced culture. Identity and access management is the key to secure access.

  • Managing Access Security in a Multi-Perimeter World

    Sponsored by: IBM

    Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.

  • Video: Incorporate SIM tools to stay compliant

    Sponsored by: HP Enterprise Security

    This resource outlines potential benefits of SIM and log analysis such as improvements in access control, data leak prevention and much more.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • Global Security University: IAM Integration Classroom

    Sponsored by: IBM

    This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos, Inc.

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Podcast: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.

  • Closing the Loop for Effective Network Operations Management Webcast

    Sponsored by: Cisco Systems, Inc.

    This webcast explores the need for operational efficiency in the modern enterprise and why network monitoring and management is so vital. View now to uncover details of a portfolio of networking products that can help you with network visibility, troubleshooting, and more!

  • The Authoritative ID Store Is Dead - How Cloud Changes Provisioning

    Sponsored by: Intel

    Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.

  • Advanced Authentication Methods: Software vs Hardware

    Sponsored by: CA Technologies.

    View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Secure Cloud Access Reference Architecture Model

    Sponsored by: Intel

    Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.

  • Cloud Access 360 Overview Video

    Sponsored by: Intel

    Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.

  • Automating User Provisioning: A User’s Perspective

    Sponsored by: Oracle Corporation

    Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.

  • Secure Cloud Access Reference Architecture & Use Model

    Sponsored by: Intel

    This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection).

  • The Promise of Content-Aware Identity and Access Management

    Sponsored by: CA Technologies.

    This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy.

  • Three Key Areas for Improving your Compliance Programs

    Sponsored by: CA Technologies.

    This podcast focuses on the area of compliance, with a particular emphasis on the role of identity and access management in achieving compliance. It explores some of the key issues in compliance, and highlights techniques and best practices in identity and access management that can simplify and strengthen your compliance challenges.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.