ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:OneLogin

  • How to Develop A Business Continuity Plan

    A security-first continuity plan is crucial to running your company in the event of an emergency or a critical market change. Given the current crises around COVID-19, OneLogin published a how-to manual to help your organization remain operational in the event of a disaster. Read on to get started.

  • Protecting Your Organization from Password Breaches

    With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.

  • Winning the Battle Over Passwords

    Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.

  • Taking the Complexity Out of Moving to Office 365

    Discover 14 questions to ask yourself and/or your vendors so you can choose the best way for your organization to integrate Office 365 with Active Directory and enable secure single sign-on across web, Outlook and mobile email clients.

  • Understand How SSO and MFA Improve Security

    IT departments are in a tough spot when it comes to security. The most common attacks are aimed at obtaining user credentials, with the password being the critical element. In this white paper, learn why secure SSO and risk-aware MFA are the golden keys to protecting your organization's sensitive information.

  • 5 Reasons Relying on Passwords is a Recipe For Disaster

    In today's environment—with cybercrime rising and hackers beginning to use machine learning—passwords just don't provide enough protection for businesses. Download this resource for 5 reasons why.

  • Why IT Shouldn't Be the Middle Guy in Password Resets

    When users forget their passwords, they need them reset. Guess who's on task? IT is right in the middle of the password reset equation. Download this resource to learn about Single Sign-On and how it can automate this task, so you don't have to be the password reset machine.

  • Solving the Password Problem in the Technology Industry

    Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.

  • The Unified Access Management Playing Field

    Today, employees expect to work the way they live—not to step back in time when they work, whether they're in the office or remote. Read on to find out why IT leaders are rethinking their IAM strategy and moving towards a unified approach to access management.

  • Multi-Factor Authentication (MFA): Is this the Security Solution You Need?

    Users want a simple user experience to complement the way they work. IT wants an adequate level of risk mitigation for the organization. Implementation of adaptive Multi-Factor Authentication (MFA) can balance these two factors. Read on to learn more.

  • Single sign-on: Understanding the role of SSO in security

    IT is under pressure to securely support large numbers of apps in a hybrid environment. Passwords are a big problem when it comes to app security because they are difficult for IT to manage. Single sign-on, or SSO, gives users just one password they can use to access all their applications. In this white paper, learn about all things SSO.

  • 3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)

    Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.

  • Prevent Laptop Security Breaches —No Active Directory Required

    Users accessing corporate data, apps, devices, on laptops or off-premise, is at an all-time high and businesses must increase their security. Explore ways your organization can shrink its security gaps and risks with Single-Sign On (SSO).

  • The Emergence of Unified Access Management

    In a recent survey from 451 Research, 55% of respondents said security and compliance are what is stopping them from using a hosted IT infrastructure. Explore this business impact brief to see how unified access management can help alleviate these security concerns.

  • IAM Case Study: How to Maximize Your ROI and Security

    Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.

  • Getting Started with Cloud IAM Services

    In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.

  • How to Craft SSO and IAM Strategies on the Cloud

    Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.

  • Understanding, Building and Securing an IAM Cloud Architecture

    This presentation transcript will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.