ComputerWeekly.com Research Library

Powered by Bitpipe.com

AAA Research

  • Best Practices for Managing and Understanding Mobile Authentication

    Sponsored by: TechTarget Security

    In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.

  • Best Practices for mobile authentication

    Sponsored by: TechTarget Security

    Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.

  • Building the Right Mobile Security Toolkit

    Sponsored by: TechTarget Security

    Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.

  • Business email compromise prevention tips

    Sponsored by: TechTarget ComputerWeekly.com

    It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.

  • BYOD Security Policy Considerations and Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.

  • BYOPC Strategy: Policies and Problem Solving

    Sponsored by: TechTarget Security

    Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.

  • Authentication 101: What You Need to Know

    Sponsored by: HYPR

    What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.

  • Authentication in the Enterprise: Current and Changing Requirements

    Sponsored by: PistolStar, Inc.

    This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.

  • Authentication Tokens: The Key to Secure PCs and Data

    Sponsored by: Aladdin Knowledge Systems

    This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.

  • Best Practices for a Secure Mobile Workforce

    Sponsored by: Accellion, Inc.

    Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.

  • Best Practices for Archiving Lotus Domino Environments

    Sponsored by: Symantec Corporation

    This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.

  • Best Practices for Deploying LAN Security and NAC

    Sponsored by: Nevis Networks

    Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.

  • Best Practices in Authentication and Access Control

    Sponsored by: Nevis Networks

    Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.

  • Better Leveraging Active Directory

    Sponsored by: Radiant Logic, Inc.

    Find out how your business can have a better and more efficient identity management system in this white paper.

  • Beyond Passwords & Outdated Physical Access Systems

    Sponsored by: Entrust, Inc.

    Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • Blackberry Enterprise Solution: Security Technical Overview

    Sponsored by: BlackBerry

    This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.

  • Bloomberg Personal Vault

    Sponsored by: Bloomberg

    Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.

  • Build Your Identity And Access Management Strategy

    Sponsored by: Symplified

    This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.

  • Building a Secure and Compliant Windows Desktop

    Sponsored by: BeyondTrust Corporation

    Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

  • Chalk Talk: Simplify User Access with NetIQ Solutions

    Sponsored by: NetIQ

    View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.

  • Choosing a Cloud Provider with Confidence

    Sponsored by: GeoTrust, Inc.

    In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.

  • CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier

    Sponsored by: TechTarget CIO

    Prescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work.

Browse by Report Type: AAA White Papers | AAA Multimedia | AAA IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.