ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control White Papers

  • Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner

    Sponsored by: CA Technologies

    This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.

  • Executive Viewpoint: Getting Tough on Security Threats

    Sponsored by: F5 Networks

    In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.

  • How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

    Sponsored by: CA Technologies.

    This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.

  • Break the Kill Chain: Stop Data Breaches

    Sponsored by: CA Technologies.

    Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.

  • Break the Kill Chain: Stop Data Breaches

    Sponsored by: CA Technologies

    Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.

  • Context-Aware, Dynamic Access Control

    Sponsored by: Cryptzone

    This brief resource outlines how security pros need to take a dynamic approach to secure network access. Read on to learn about a new platform that considers both context and identity to grant access to your network, and see if it's right for your business.

  • A Guide to Protecting your Critical Assets with Identity Governance

    Sponsored by: IBM

    In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.

  • How Identity Governance Became a Key Compliance and Risk Control

    Sponsored by: IBM

    In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.

  • Eliminating the Drawbacks of Distributed SaaS Provider Identity

    Sponsored by: F5 Networks

    In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.

  • Deploy an Enterprise Mobility Gateway to Optimize Access Control

    Sponsored by: F5 Networks

    In this white paper, you will learn how to scale, secure, and optimize control of your anytime, anywhere network, cloud, and application access. Read this paper to securely manage your workforce mobility and unburden your IT department and learn how to deliver seamless user access to all web-based resources.

  • Securing the Enterprise with an ADC

    Sponsored by: A10 Networks

    To protect web applications, organizations need to deploy the right firewalls. Access this infographic to learn more ways to strengthen security in the enterprise when you secure your data center assets, protect sensitive data with SSL offloading, and more.

  • The Top 5 Tasks to Automate for Privileged Account Management and Security

    Sponsored by: Thycotic

    In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage, and learn how to automate SSH key management, compliance reporting, and more.

  • Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare

    Sponsored by: SecureAuth

    In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.

  • Using Identity to Create Next Generation, Risk-based Access Management

    Sponsored by: SecureAuth

    In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.

  • Evaluating Standout Services in the Cloud Identity and Access Management Sector

    Sponsored by: SecureAuth

    If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.

  • Enhacing IAM and Authentication with Threat Intelligence

    Sponsored by: SecureAuth

    What happens when two authentication leaders unite to create a new platform to advance threat detection? You'll have to read this white paper to find out. Read on now to learn how to use keystroke analysis to detect signs of compromised credentials earlier.

  • Case Study: National Healthcare Provider Secures Office 365

    Sponsored by: Palerra Inc.

    In this white paper, review how one of the largest national healthcare providers in the U.S. filled in Office 365 and cloud security gaps and adhere to regulatory requirements.

  • The Challenge of Keeping IAM Simple

    Sponsored by: Thycotic

    This expert e-guide presents the individual challenges the 4 key IAM roles face as they work to mitigate identity fraud/theft. Continue reading to learn why previous IAM projects have failed and how you can overcome the many challenges your organization faces to simplify your IAM approach.

  • The Insider Threat: From Risk to Detection

    Sponsored by: Interset Software Inc.

    In this white paper, you will learn the 3 most common types of insider attacks and how to build an effective defense against them.

  • Privileged Account Management Security Action Plan

    Sponsored by: Thycotic

    This white paper explains why your organization cannot continue operating without privileged account management as the risks for a crippling data breach skyrocket each day without it. View now to learn the challenges of privileged account management and what you can do to overcome them to improve security.

  • Case Study: Protecting Privileged Accounts for a Global Manufacturer

    Sponsored by: Thycotic

    In this case study, learn how one manufacturing company restructured their outdated access and password management strategy to meet compliance requirements and mitigate data breaches, theft, and loss.

  • Privileged Password Security Policy Template

    Sponsored by: Thycotic

    This white paper offers a security policy template to enable your organization to secure user access accounts from basic profiles to advanced privileges. View now to learn how to comply with governance requirements and enhance IAM security.

  • Privileged Access Management: Why Sudo in Longer Enough

    Sponsored by: FoxT

    This white paper presents Sudo's shortcomings for identity and access management of privileged accounts and what you can do to guarantee secure authentication for users. Read on to learn more.

  • Utility Protects Servers and Simplifies Compliance with Access Management

    Sponsored by: FoxT

    Defining, managing, and enforcing authentication automatically across diverse IT platforms and locations is no easy feat. This case study explores how South Western Electric & Power Company enabled effective access control and centralized administration, authentication, authorization, and auditing.

  • Taming the Beast- Controlling SSH for Security and Compliance

    Sponsored by: FoxT

    Are SSH keys the saviors of identity management and access security for your organizations? With several different styles of keys, it's imperative you know the differences and guidelines to using them. Access this white paper to learn more about SSH keys and taking the next step to centralizing SSH session access control to boost security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.