ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Ping Identity Corporation

  • MFA Everywhere: Requirements for Rapid Adoption

    81% of confirmed data breaches involved weak, default or stolen passwords. This has led to an increase in multi-factor authentication adoption. This webcast reveals why MFA is just reaching wide spread adoption, why it is needed, requirements for implementing it and how to prepare organizations for a successful rollout.

  • SSO+MFA Demo: Stop the #1 Security Attack Vector

    With credentials being the #1 attack vector, many organizations are replacing passwords with advanced authentication. This webcast discusses 5 key capabilities that can be used to secure the enterprise including multi-factor authentication, single sign-on and access security. During the webcast, you will also be walked through a demo SSO and MFA.

  • Goodbye 2FA. Hello Modern MFA

    According to Verizon's Data Breach Investigations Report, 81% of hacks involve weak or stolen credentials. Although typical multi-factor authentication is a step in the right direction, many have limited coverage, poor user experience and minimal policy options. In this webcast, learn how contextual MFA eliminates weak credentials.

  • Multi-Factor Authentication: Best Practices for Securing the Modern Digital Enterprise

    Comprised credentials continue to be a top risk for breach with enterprises. One way to combat this issue is with step-up MFA. Step-up multi-factor authentication (MFA) is a dynamic authentication model where the user is required to perform additional authentication operations. This white paper proposes best practices for deployment of step-up MFA.

  • Securing your Enterprise Credentials

    Stealing credentials is the primary motive for those that intend on attacking your enterprise. And relying on usernames and passwords can make it easier for them. In this white paper, learn how to implement an MFA solution to strengthen your security, so you can confidently manage digital transformation across your enterprise.

  • It's Time to Stop Talking About Passwords

    In this quick guide to password security, learn how you can mitigate the risk of cyberattacks, while also providing a frictionless user experience to your employees with multi-factor authentication (MFA).

  • You Can't Spell Enterprise Security without MFA

    Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and controls with multi-factor authentication, allowing them to move away from a high-risk, password based security approach. Listen as Paul Madsen from the CTO office of Ping Identity explains the benefits of MFA.

  • The Security Leader's Guide to Multi-Factor Authentication

    Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.

  • Multi-Factor Authentication Buyer's Guide: Getting Started

    Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.

  • Internet-Scale Identity Systems:An Overview and Comparison

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

  • Pick Your Identity Bridge

    This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.

  • Security Assertion Markup Language (SAML) - the Essential Guide

    This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more!

  • Internet-Scale Identity Systems: An Overview and Comparison

    This white paper provides an overview of the key initiatives for Internet-scale identity systems and explores the similarities, differences, and synergies between them.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

  • Reinforce Business Objectives and Achieve ROI with Internet Identity Security

    Read this white paper to learn how after deploying PingFederate or PingConnect your organization will yield a high return on investment and run more efficiently and will have distinct competitive advantage over companies that do not leverage Internet Identity Security Software.

  • Secure Internet Single Sign-On (SSO) 101

    Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution.

  • Five Steps to Secure Internet Single Sign-On (SSO)

    This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.