ComputerWeekly.com Research Library

Powered by Bitpipe.com

AAA Research

  • Guide to Mobile Device Management Software

    Sponsored by: TechTarget Security

    This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.

  • Identity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

  • Implementing a Zero-Trust Approach to Network Security

    Sponsored by: TechTarget

    Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.

  • Hardware and Software Authentication: Choosing the Right Approach

    Sponsored by: SafeNet Asia Ltd

    In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.

  • Hardware and Software Authentication: Choosing the Right Approach

    Sponsored by: SafeNet, Inc.

    This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • Hot Tips for Securing Your Wireless Network

    Sponsored by: Sophos

    Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.

  • How can organizations get control over privileged identity management?

    Sponsored by: One Identity

    Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information

  • How Can Privileged Access Accounts Be Managed in Large Companies?

    Sponsored by: One Identity

    According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.

  • How IAM Addresses Unstructured Content Security Risks

    Sponsored by: STEALTHbits

    Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.

  • How IAM has Evolved on the Cloud: The Good and the Bad

    Sponsored by: IBM

    Learn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.

  • How IAM Systems Support Compliance

    Sponsored by: Beta Systems

    Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.

  • How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)

    Sponsored by: BeyondTrust Corporation

    This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.

  • How SSL and TLS Secure Network Transactions

    Sponsored by: GeoTrust, Inc.

    This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!

  • How to Extend your Identity Management Systems to use OAuth

    Sponsored by: Forum Systems

    Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.

  • How to Properly Move into the Cloud

    Sponsored by: Forum Systems

    This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.

  • IAM for the Real World – Privileged Account Management

    Sponsored by: One Identity

    Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.

  • IBM Optim Data Privacy Solution for SAP

    Sponsored by: IBM

    The IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing.

  • IDC 2014 WW MarketScape Report for Federated Identity Management and SSO

    Sponsored by: IBM

    Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.

  • IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise

    Sponsored by: IBM

    Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.

  • Identity and Access Management Buyer's Guide

    Sponsored by: IBM

    This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.

  • Identity and Access Management Guidelines

    Sponsored by: Radiant Logic, Inc.

    This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.

  • Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?

    Sponsored by: Dell Software

    Learn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.

  • IFS Enterprise Asset Management - EAM/CMMS

    Sponsored by: IFS

    IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit.

  • Implementing a Telecommuting Program

    Sponsored by: Avaya Inc.

    This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.

Browse by Report Type: AAA White Papers | AAA Multimedia | AAA IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.