ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Ping Identity Corporation

  • Customer Identity & Access Management (CIAM)

    Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.

  • Discover Hidden API Security Vulnerabilities and How to Defend Against Them

    Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.

  • Multi-Factor Authentication: Best Practices for Securing the Modern Digital Enterprise

    Comprised credentials continue to be a top risk for breach with enterprises. One way to combat this issue is with step-up MFA. Step-up multi-factor authentication (MFA) is a dynamic authentication model where the user is required to perform additional authentication operations. This white paper proposes best practices for deployment of step-up MFA.

  • Multi-Factor Authentication Buyer's Guide: Getting Started

    Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.

  • Internet-Scale Identity Systems:An Overview and Comparison

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

  • Pick Your Identity Bridge

    This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.