ComputerWeekly.com Research Library

Powered by Bitpipe.com

AAA Research

  • Comparing Azure Active Directory options

    Sponsored by: TechTarget ComputerWeekly.com

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

  • Computer Weekly – 5 March 2024: Authorised access only – biometrics in the workplace

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now.

  • Consumerization 101: Defining & Enforcing a Successful BYOD Policy

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.

  • Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD

    Sponsored by: TechTarget Security

    BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.

  • E-Guide: Are 'strong authentication' methods strong enough for compliance?

    Sponsored by: TechTarget Security

    Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.

  • E-Guide: Preventing and detecting security vulnerabilities in Web applications

    Sponsored by: TechTarget Security

    The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.

  • CipherCloud for Office 365 - Encryption Solution Demo

    Sponsored by: CipherCloud

    In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.

  • Cisco Aironet 1300 Series Outdoor Access Point/Bridge

    Sponsored by: Cisco Systems, Inc.

    The Cisco® Aironet® 1300 Series Outdoor Access Point or Bridge is an 802.11g access point and bridge that provides high-speed and cost-effective wireless connectivity between multiple fixed or mobile networks and clients.

  • Cisco Any Device: Planning a Productive, Secure and Competitive Future

    Sponsored by: Cisco

    Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.

  • Citrix GoToMyPCCorporate - Security White Paper

    Sponsored by: Citrix Online - GotoMyPC

    In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.

  • Complete and Scalable Access Management

    Sponsored by: Oracle Corporation UK Ltd

    This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.

  • Consumer Web Portals: Platforms at Significant Security Risk

    Sponsored by: EMC Corporation

    This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.

  • Contextual Authentication: A Multi-factor Approach

    Sponsored by: PortalGuard

    This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: TechTarget Security

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Cover Your SaaS!

    Sponsored by: BitGlass

    This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: TechTarget Security

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

  • CyberFusion Integration Suite™ (CFI): Managed File Transfer (MFT)

    Sponsored by: Proginet Corporation

    CyberFusion Integration Suite (CFI)™, from Proginet, is the world's most advanced managed file transfer solution.

  • Defining Identity Management

    Sponsored by: Hitachi ID Systems, Inc.

    This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • E-Book: Technical Guide on Managing Identities and Access Control

    Sponsored by: CA Technologies

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

  • E-Zine: Software Testing Vol.2 - Testing Strategies for Complex Environments: Agile, SOA

    Sponsored by: IBM

    In this issue of SearchSoftwareQuality.com's Software Testing e-zine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology.

  • Eagle Bank Keeps Deposits and Customer Data Safe

    Sponsored by: Imprivata

    This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.

  • EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard

    Sponsored by: Qualys, Inc.

    The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks.

  • eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network

    Sponsored by: TechTarget Mobile Computing

    Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.

Browse by Report Type: AAA White Papers | AAA Multimedia | AAA IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.