ComputerWeekly.com Research Library

Powered by Bitpipe.com

AAA Research

  • Infographic: 5 cybersecurity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.

  • IT Priorities 2020: After Covid-19, security goes back to basics

    Sponsored by: TechTarget ComputerWeekly.com

    This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.

  • Making Sense of Zero-Trust Security

    Sponsored by: TechTarget

    As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.

  • Implementing Database Security and Auditing - Authentication and Password Security

    Sponsored by: IBM

    In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.

  • Improving Identity and Access Management in an SAP Environment

    Sponsored by: Dell Software

    In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.

  • Incorporating Authentication with Imaging and Printing Devices to Improve Data Protection

    Sponsored by: Hewlett-Packard Enterprise

    This exclusive paper discusses a security solution that helps protect your company's confidential information and control printing access by requiring users to authenticate at your imaging and printing devices with your existing proximity cards.

  • Information Security Magazine - September 2009: Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.

  • Information Security Magazine: August Issue

    Sponsored by: TechTarget Security

    Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.

  • Information Security – May 2014

    Sponsored by: TechTarget Security

    The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?

  • Insider Security Threats: What CISOs Can Do to Mitigate Them

    Sponsored by: Preempt Security

    Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.

  • Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

    Sponsored by: Intel

    Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.

  • Internet Security and Acceleration Server 2006

    Sponsored by: Microsoft

    ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.

  • Internet-Scale Identity Systems:An Overview and Comparison

    Sponsored by: Ping Identity Corporation

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

  • Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website

    Sponsored by: GeoTrust, Inc.

    This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more.

  • ISM December 2012

    Sponsored by: TechTarget Security

    In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.

  • IT in Europe: Breaking the Code: Are passwords destined for obscurity?

    Sponsored by: TechTarget ComputerWeekly.com 

    This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.

  • IT Priorites 2020 - After Covid 19 security goes back to basics

    Sponsored by: TechTarget ComputerWeekly.com

    This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.

  • IT Security: Built-In Protection with Intel vPro Technology

    Sponsored by: Intel

    New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.

  • It's Time Businesses Wake up to Mobile Security Reality

    Sponsored by: Threat Track Security

    This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.

  • Keeping Your Data Safe and Your Networks Connected

    Sponsored by: SonicWALL

    This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.

  • Knowledge is Power

    Sponsored by: IBM

    Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.

  • Leverage Active Directory with Kerberos to Eliminate HTTP Password

    Sponsored by: PistolStar, Inc.

    This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.

  • Manage with ease: Get peace of mind with HP and Windows Embedded

    Sponsored by: Hewlett Packard Enterprise

    In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.

  • Managing Identities and Access Control

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

  • Managing identities and access in the cloud

    Sponsored by: IBM

    This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.

Browse by Report Type: AAA White Papers | AAA Multimedia | AAA IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.