Research Library

Powered by

Access Control White Papers

  • How to Securely Sync, Share, Collaborate, and Manage Business Content

    Sponsored by: IntraLinks, Inc

    This white paper examines one Software as a Service (SaaS) strategy and how it enables mobile content access and secure file sharing outside of the firewall. View now to see how other organizations have used this approach to protect data and files as they are accessed and shared and if it is right for your organization.

  • Challenges and Benefits of Making a Business Case for IAM

    Sponsored by: Nexmo

    This expert e-guide explores the 5 critical issues in IAM that have plagued IT for the past 5 years. Additionally, continue reading to learn how one organizations is using IAM as a strategic tool for improving performance on top of information security.

  • Next Generation Cloud Security

    Sponsored by: Symantec

    In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.

  • Defending Against New Ransomware Threats

    Sponsored by: Trend Micro

    In this white paper, discover five ways to make sure you're prepared for a ransomware attack.

  • Governance-Driven Provisioning: The Future of Provisioning

    Sponsored by: RSA

    This white paper explores the history of provisioning challenges organizations have faced and what the future holds for the technology and network security. View now to learn how a governance-driven approach improves your overall identity and access management (IAM) strategy and avoids the pitfalls of a traditional architecture.

  • Data Governance Risk: Know Who Has Your Data

    Sponsored by: RSA

    Did you know that 76% of organizations find it challenging to control access to sensitive data? Access this brief infographic to gain a better understanding of common data governance challenges and the dire consequences if they are not addressed.

  • IAM - The Foundation of Cloud Security

    Sponsored by: Symantec

    This brief white paper examines key components for an effective IAM program to protect your sensitive data from unauthorized access.

  • Single-Sign-On: Streamlining Remote Access

    Sponsored by: SecureAuth

    This case study explores how to use multi-factor authentication and single-sign-on (SSO) to remove the reliance on tokens and secure access to the enterprise network and data. Access now to examine how one organization was able to overcome authentication and access challenges using this strategy.

  • Hybrid Environments Demand Coordinated IAM for both Security and Agility

    Sponsored by: Microsoft

    Access this resource to see the results of a Forrester Consulting report which reveals how organizations are using IAM in hybrid clouds and the benefits it can bring if handled with care.

  • Case Study: Ensuring Automated Access Governance

    Sponsored by: RSA

    In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.

  • Hybrid Environments Demand Coordinated IAM For Both Security And Agility

    Sponsored by: Microsoft

    View this informative report issued by Forrester that explains the IAM challenges firms are facing with hybrid cloud architecture, how these are being addressed currently, and the projected evolution of these management techniques in response to continued and accelerated cloud adoption.

  • Making Big Data Accessible, Actionable and Affordable

    Sponsored by: Kofax, Inc.

    Read this white paper for use cases of real-world customers who are reaping benefits from big data that was once almost impossible to access. Learn how your organization can also harness this data from internal and external sources and put it in the hands of business users rapidly and cost-effectively.

  • The Evolution of Provisioning

    Sponsored by: RSA

    This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.

  • Centricity™ Cardio Enterprise Solution for the Echo Lab

    Sponsored by: GE Healthcare

    Centricity Cardio Enterprise solution for the Echo Lab empowers cardiologists to help enhance patient care through full clinical access, optimized productivity, and improved revenue cycle efficiencies. Read this white paper to learn more about this single point of access to unified patient data, images, and reports.

  • Case Study: Secure File Sharing with Investors

    Sponsored by: IntraLinks, Inc

    This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.

  • Simplify, Unify Access with a Converged Campus Network

    Sponsored by: Hewlett-Packard Company

    This white paper explores how converging wired and wireless access layers can help you gain the ability to meet the exploding demand for connectivity in a way that is not only sustainable, secure, and manageable, but can also deliver a better user experience.

  • Empowering Cardiologists to Enhance Patient Care

    Sponsored by: GE Healthcare

    Read this white paper to learn how cardiologists can gain a single point of access to unified patient data, images, and reports across multiple modalities, with end-to-end configurable workflows. Additionally, cardiologists can enhance patient care through improved productivity and revenue cycle efficiencies.

  • Intralinks® Information Rights Management

    Sponsored by: IntraLinks, Inc

    Access this data sheet to learn about an Information Rights Management tool that can secure your content.

  • Securing Shared Data through FSS systems

    Sponsored by: IntraLinks, Inc

    This case study explores how a robust file sync and share (FSS) system can secure data accessed by collaborators.

  • Improving the Effectiveness of Log Analysis

    Sponsored by: Hewlett-Packard Company

    This white paper acts as a buyer's guide for log monitoring and management solutions and points out the five key features you need to ensure data protection.

  • Critical Factors to Endpoint Security

    Sponsored by: Dell, Inc. & Intel®

    Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.

  • OpenShift Enterprise: An On-Premise, Private PaaS

    Sponsored by: Red Hat

    This data sheet describes an on-premise, private PaaS that lets enterprises easily build the applications they need and run them in a cloud architecture.

  • Data Security Strategies for Next Gen Data Warehouses

    Sponsored by: IBM

    In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.

  • 4 Steps to A Proactive Big Data Security and Privacy Strategy

    Sponsored by: IBM

    This white paper outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe without hindering user performance.

  • The Essential Guide to Privileged Activity Monitoring

    Sponsored by: BalaBit

    In it, learn how privileged activity monitoring can help you control your IT environment without compromising user productivity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.