ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control White Papers

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about on your next enterprise grade IDaaS provider with this buyer's guide.

  • Why Digital Business Needs a New Approach to Information Security

    Sponsored by: Entrust, Inc.

    This resource details how companies are turning to new technologies which establish identity and promote trust in order to extend the reach of their digital businesses. Further, you will learn about today's security environment as it exists inside and outside of the office.

  • Get Control Over Your Cloud Security

    Sponsored by: LogRhythm, Inc.

    You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.

  • Top 5 Reasons Public Sector Looks to the Cloud

    Sponsored by: Accenture

    As businesses continue to deal with digital transformation, public sector organizations have more requirements to deal with than those in the private sector. Discover the 5 key areas that make cloud the best option for public sector digital transformations.

  • Top 10 Security Advantages of One Business Management Platform

    Sponsored by: Acumatica

    Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.

  • Cloud IAM Buyer's Guide: Which Vendor is Right for You?

    Sponsored by: IBM

    Discover five simple questions you must ask of any potential Identity and Access Management as a Service (IDaaS) vendor to get a fresh look at your options. Learn how to score each vendor to easily compare their strengths and weaknesses.

  • 3 Types of Insider Threats to Watch Out For

    Sponsored by: Absolute

    Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.

  • Enable Collaboration without Compromising Content

    Sponsored by: IntraLinks, Inc

    Chances are that you need to do work with outside parties, but you're concerned that doing so puts your content at risk. Find out what Young New Yorkers, a non-profit organization, did to ensure that they could maintain their collaborative efforts without compromising content security.

  • Managing Content Beyond the Corporate Walls: Working in the Cloud

    Sponsored by: ASG

    If your organization doesn't provide employees with proper content management, they'll make up their own, putting security and compliance at risk. Access this white paper to learn how to manage your organization's content beyond your firewalls and corporate structure, and why the path to success is through the cloud.

  • Advanced Authentication Strategies for Detecting Real-time Threats

    Sponsored by: HID

    How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.

  • Public Key Infrastructure: The New Best Practices

    Sponsored by: Certified Security Solutions (CSS)

    This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.

  • Public Key Infrastructure: Traditional Deployments vs. IoT PKI

    Sponsored by: Certified Security Solutions (CSS)

    This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.

  • SHA-1 is Dead. Long live SHA-2!

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to quickly and effectively implement a SHA-1 depreciation plan to ensure that every certificate in your organization is based on the new SHA-2 algorithm. Learn why SHA-1 is out, the reasons behind deprecation timing, and best practices and resources for your SHA-2 migration.

  • Keeping the Keys to Your Cloud Future Secure

    Sponsored by: Entrust, Inc.

    Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.

  • Trusted Identities in Digital Business The Benefits of PKI

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your teams time, effort, and resources.

  • How To Capture & Manage The Content That Drives Your Business

    Sponsored by: ASG

    Many businesses struggle to capture and integrate large volumes of content from a wide variety of business applications—but it doesn't have to be such a challenge. Learn what to consider in content capture and management software that can offer content access and control, lifecycle storage support, and much more.

  • How to Unlock EMS: 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite

    Sponsored by: Microsoft

    In the era of mobility, BYOD is a major concern. The Enterprise Mobility Suite (EMS) is a sweeping platform that works with existing cloud platforms, and covers mobile management and data protection. Access this brief resource to learn just what EMS is capable of and the value it has to offer.

  • For Better Access Governance, Look Beyond Roles to

    Sponsored by: IBM

    Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.

  • Cost-Effectively License Enterprise Mobility Cloud Services for All Your Users

    Sponsored by: Microsoft

    In this paper, receive an introduction to a cloud-based enterprise mobility suite that can provide your end users access to the applications they need while keeping enterprise data protected. Explore 3 different tiers and how each supports productivity, mobile management, and security.

  • The Power of Modern Access Management Tools

    Sponsored by: IBM

    Find out how you can take back control of access management with an integrated platform for web, mobile & cloud in this white paper.

  • Five Signs It’s Time for Mobile Workspace Delivery

    Sponsored by: Citrix

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

  • Securing Data Access Within the Healthcare Industry

    Sponsored by: VASCO Data Security International

    Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.

  • Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now

    Sponsored by: IBM

    Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.