ComputerWeekly.com Research Library

Powered by Bitpipe.com

AAA Research

  • 10 Ways to Secure and Accelerate a Modern Workforce

    Sponsored by: Cloudflare

    As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.

  • 5 Identity Attacks that Exploit Your Broken Authentication

    Sponsored by: Okta

    Compromised credentials are the leading cause of data beaches. These credentials can be compromised through a number of attacks, including phishing, credential stuffing and password spraying. In this infographic, learn how your organization can defend against data breaches with strong authentication.

  • 5 Questions Every CIO Must Answer in the Coronavirus Age

    Sponsored by: Hitachi Vantara

    The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • A Comprehensive Guide to Authentication Technologies and Methods

    Sponsored by: Thales

    Given the number of vectors being targeted by hackers, organizations are opting for a variety of focused tools based on need rather than an all-in-one approach to protect their digital identities. Read this comprehensive guide to learn more about the key methods and challenges surrounding authentication.

  • A Guide to MAM and Planning for BYOD Security in the Enterprise

    Sponsored by: SearchSecurity.com

    In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.

  • A Guide to Verifying Users for Marketplaces

    Sponsored by: Vonage

    Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.

  • A Guide to Verifying Users in Financial Services

    Sponsored by: Vonage

    Learn how banks and fintech companies can securely onboard customers at global scale with phone verification.

  • Access Management Handbook

    Sponsored by: Thales

    The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.

  • ACT.md Sees 2x Dev Savings With Auth0

    Sponsored by: Auth0

    To serve patients well, providers need fast and secure access for a wide variety of health and government institutions, each with different ways of verifying identity. In this case study, learn how ACT.md was able do so using Auth0.

  • Advanced AD Bridging for Prodigious IT Gains

    Sponsored by: Centrify Corporation

    Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.

  • 2014 Magic Quadrant for User Authentication

    Sponsored by: SafeNet Asia Ltd

    View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • 5 Trends to Watch in 2018 for Content Management Systems

    Sponsored by: Enginess

    In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.

  • 6 Ways to Enhance Security in AWS

    Sponsored by: SafeNet, Inc.

    In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.

  • 7 Things Every System Administrator Should Know about OpenSSH

    Sponsored by: Global Knowledge

    This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.

  • 802.1X: Port-Based Authentication Standard for Network Access Control (NAC)

    Sponsored by: Juniper Networks, Inc.

    This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.

  • A Guide to Password Use in WebSphere Application Server

    Sponsored by: Global Knowledge

    Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

  • A More Secure From Door: SSO and Strong Authentication

    Sponsored by: Imprivata

    This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.

  • Achieve secure mobile access to enterprise applications

    Sponsored by: Oracle Corporation UK Ltd

    This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.

  • ActivID® Authentication Appliance for Enterprise

    Sponsored by: HID Global

    In this brochure, discover a solution that puts an end to your identity and authentication worries.

  • Adaptive Access Management: An ROI Study

    Sponsored by: Oracle Corporation

    Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.

  • Adaptive Strong Auth & Federated SSO - The New Power Couple

    Sponsored by: Intel

    Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.

  • All You Need to Know about SSO

    Sponsored by: HYPR

    The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: SearchSecurity.com

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

Browse by Report Type: AAA White Papers | AAA Multimedia | AAA IT Downloads

See more topics related to: AAA

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.