ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control White Papers

  • White Paper: Identity is the Center of Always-on Connectivity

    Sponsored by: Ping Identity Corporation

    This white paper examines the advantages organizations stand to gain by using an identity and access management platform to federate access control across all applications and create a centralized view of all your users' information, allowing you to dramatically improve your customer experience.

  • Managing Identity as the New Perimeter

    Sponsored by: Ping Identity Corporation

    This white paper provides a comprehensive overview of how mobility and virtualization trends are impacting identity and access management (IAM), what solutions are available to address potential challenges, and how to future-proof your identity management strategy for any business scenario.

  • Maximize Data Security with Encryption and Key Management

    Sponsored by: SafeNet, Inc.

    This white paper explores a comprehensive approach to protecting the digital and traditional information that your enterprise collects and utilizes, based on 5 best practices for data security laid out by IBM.

  • eBook: How Customer Experience Impacts Your Identity and Access Management Practices

    Sponsored by: Ping Identity Corporation

    This white paper discusses how customer experience influences IAM and security and examines the actions you can take to deliver secure, seamless experience for your customers.

  • White Paper: SAML 101

    Sponsored by: Ping Identity Corporation

    This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language - SAML. It describes why standards like SAML are necessary for implementing federated identity across organizations.

  • eBook: CIOs Guide to Modern Identity

    Sponsored by: Ping Identity Corporation

    This white paper explores five key trends impacting CIOs and security management today, and discusses how focusing on authenticating user identity versus protecting the endpoint can help companies successfully overcome the security challenges presented by these key trends.

  • The Zero Trust Model Of Information Security

    Sponsored by: Zscaler

    This white paper introduces the Zero Trust Model of information security, which eliminates the idea of trusted and untrusted networks in favor of viewing all network traffic as untrusted.

  • Secure by Design

    Sponsored by: Citrix

    This white paper explores the growing IT security challenges in today's computing environment. Examine a solution that can dramatically reduce the effort required to protect mission-critical information while giving user's fast, simple, flexible remote access.

  • A Centralized Key Management Solution for Your Enterprise's Security Needs

    Sponsored by: SafeNet, Inc.

    This white paper introduces SafeNet KeySecure: A single, centralized platform for managing cryptographic content (keys and related data) and applications, capable of running in on premise, cloud, or hybrid environments.

  • Top 5 Facts to Know About Data Protection from SafeNet

    Sponsored by: SafeNet, Inc.

    This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.

  • eBook: How to Secure a Data Breach

    Sponsored by: SafeNet, Inc.

    This e-book describes what the future of data breaches will look like for organizations around the world, and lists the three major steps that all enterprises need to take in order to protect their sensitive data.

  • Sensitive Data Is Everywhere, So Data Protection Should Be, Too

    Sponsored by: SafeNet, Inc.

    This infographic helps you to think about where your data and keys are located and who has access to them, and also presents one company's data protection portfolio, which provides persistent protection of sensitive information at all critical points in its lifecycle.

  • A New Security Reality: The Secure Breach

    Sponsored by: SafeNet, Inc.

    This informative white paper explains why our focus needs to shift from preventing breaches to accepting that they're inevitable, and aiming to ensure that when a breach does occur, critical data remains secure.

  • Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV

    Sponsored by: SafeNet, Inc.

    This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.

  • Identity and Access Management Guidelines

    Sponsored by: ObserveIT

    In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.

  • Prevent Fraud and Improve the User Experience with Mobile Access Management

    Sponsored by: IBM

    This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.

  • Is Your Identity Management Infrastructure a Mess?

    Sponsored by: Radiant Logic, Inc.

    This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.

  • Comply Before You Connect: Security for Federal Agencies

    Sponsored by: IBM

    This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.

  • Imaging and Printing: Is Your Valuable Data Protected?

    Sponsored by: Hewlett-Packard Limited

    This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.

  • Security in the Hybrid Cloud, Now and in 2016

    Sponsored by: F5 Networks

    The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.

  • 99.9999 Percent Data Availability

    Sponsored by: Hewlett-Packard Company

    The Get 6-Nines Guarantee Program provides a set of specific best practices for maintaining 99.9999 percent availability for mission-critical applications. Read on to find out how to achieve uninterrupted access to your storage data and meet the needs of your workloads.

  • How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure

    Sponsored by: Radiant Logic, Inc.

    This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.

  • Aligning your Enterprise Identity and Access Management Strategy

    Sponsored by: DLT Solutions

    This expert e-guide covers how you can align identity and access management with CIO and business priorities.

  • Identity and Access Management (IAM) in the Cloud

    Sponsored by: DLT Solutions

    This expert e-guide explores the growing market for cloud-based identity and access management.

  • Mobile Security Best Practices in a Healthcare Setting

    Sponsored by: Insight

    This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.