ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Ping Identity Corporation

  • Getting Customer IAM Right

    For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.

  • Customer authentication: Striking the balance between security & convenience

    Today's customers are aware of the need for additional security measures and expect organizations to provide. To address the increasing ineffectiveness of passwords, security teams are beginning to embrace customer multi-factor authentication (MFA). Read this white paper to discover the benefits and how it differs from employee MFA.

  • CIAM vs. Enterprise IAM

    Understanding the opportunities that CIAM brings, how it's different than enterprise IAM and how to choose and implement a CIAM solution may seem like a daunting task. This guide will put you on the right path to selecting the best CIAM solution for your enterprise.

  • Multi-Factor Authentication Buyer's Guide: Getting Started

    Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.

  • Workforce 360 Integrations Guide

    To address an ever-evolving environment, you need a solution purpose-built for workforce requirements and use cases. Ping's Workforce360 solution provides centralized authentication services with the capabilities you need.

  • Workforce authentication authority: What is it and what are the benefits?

    Read this white paper to gain a deeper understanding of the benefits of a workforce authentication authority, its essential capabilities, and the use cases it can support.

  • Internet-Scale Identity Systems:An Overview and Comparison

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

  • Pick Your Identity Bridge

    This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.