ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Software Research

  • Solving the Challenges of Modern Remote Access

    Sponsored by: Barracuda

    The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.

  • Equifax and the 147 Million: One Individual’s Story from behind the Headlines

    Sponsored by: Auth0

    What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.

  • IAM Leaders’ Guide to Privileged Access Management

    Sponsored by: Centrify Corporation

    While traditional identity and access management (IAM) tools offer control of standard user access, they fail to manage shared use of privileged accounts or administrator privilege elevation. This Gartner report provides a comprehensive analysis of privileged access management, designed to be the next step in IAM.

  • Providing Comprehensive Access Control & Data Security in Multi-Cloud Environments

    Sponsored by: Okta + Netspoke

    Today’s modern, flexible workforce requires a security strategy that is equally agile. For most organizations, identity management and access control is the answer. In this data sheet, take a closer look at a specific offering from Okta & Netskope, designed to meet security and productivity needs across multi-cloud environments.

  • Okta ASA Netskope Private Access demo

    Sponsored by: Okta + Netspoke

    In this video demo, join a Solutions Architect at Okta as they provide a quick walkthrough of how Okta Advanced Server Access & Netskope Private Access can work together to enhance user experience.

  • Securing Your Remote Employees with Cloud-Based Authentication

    Sponsored by: Entrust, Inc.

    Given the sudden and dramatic shift towards working from home, organizations have had to quickly enable their employees with remote access to the network. This buyer’s guide is designed to help determine which cloud-based authentication tool is best fit to meet your organization’s security needs and your employee’s operational requirements.

  • Use Your Microsoft Certificate Authority for Passwordless Authentication

    Sponsored by: Entrust, Inc.

    As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.

  • Passwordless Experience for A More Secure and Productive Workforce

    Sponsored by: Entrust, Inc.

    Passwords are quickly becoming an outdated security tool, set to be replaced by passwordless authentication methods. In this solution brief, take a closer look at the key features and capabilities of Entrust Datacard’s passwordless authentication offering, designed to increase productivity, unify access and reduce password-related risks.

  • Best Practices for Securing Critical Infrastructure for State & Local Governments

    Sponsored by: VMware International Unlimited Company

    For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.

  • SASE Series, Part 2: The Security View

    Sponsored by: Hughes Network Systems

    A term coined by Gartner, Secure Access Service Edge (SASE) is an approach to network security designed to be the successor to data centers as organizations shift their data and endpoints to the cloud. In this blog post, dive deeper into the SASE approach, the growing attack surface, and its relationship with zero trust.

  • Duo for Device Trust

    Sponsored by: Duo Security

    As organizations continue to enable employees to work remotely and interact within their own devices, mobile security becomes an increasingly critical piece of the security strategy. In this solution brief discover how Duo’s zero trust approach offering can help organizations meet their security and compliance goals.

  • Don’t Give Away Keys to Your Kingdom with ADFS

    Sponsored by: PortSys

    For years, organizations have been using Active Directory Federated Services (ADFS) to manage access to cloud applications. However, sole reliance on ADFS for managing these accounts can introduce risks. In this article, discover how Total Access Control (TAC), Portsys’ zero-trust offering, can help protect ADFS accounts from cyberattacks.

  • Zero Trust - The Citrix Way

    Sponsored by: Citrix

    For those who work in IT and security, whack-a-mole can sound a lot like their day-to-day jobs: Waiting for incidents to ‘pop up’ and reacting accordingly. But what if you knew where the problem holes were, and could cover them permanently? This article outlines the zero-trust approach, why it works, and how to achieve it.

  • Duo for Microsoft Officer365, Azure, and Windows

    Sponsored by: Duo Security

    Organizations have been embracing the productivity benefits of Microsoft tools for several years. To get the most out of these applications, third-party security services, like Duo, can help organizations with their digital transformation initiatives. Read on to learn more about Duo and discover if its features match your objectives.

  • Zero Trust Evaluation Guide for the Workforce

    Sponsored by: Duo Security

    To meet the scalability and security needs of today’s distributed business environments, organizations are adopting a zero-trust approach to manage access to sensitive data. In this white paper, take a look at the process of establishing secure trusted access from your users and their devices to work applications.

  • Omdia Market Radar: Zero-Trust Access

    Sponsored by: Cloudflare

    Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.

  • Duo Security's Two-Factor Authentication Evaluation Guide

    Sponsored by: Duo Security

    As passwords grow increasingly ineffective, new ways of authenticating users and managing identities are needed to ensure the protection of sensitive data. In this evaluation guide, learn the criteria for customizing your evaluation process and discover how to assess the efficacy of a two-factor authentication tool.

  • 10 Ways to Secure and Accelerate a Modern Workforce

    Sponsored by: Cloudflare

    As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.

  • Passwordless Authentication Solutions by Thales

    Sponsored by: Thales

    Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.

  • Advanced Authentication Buyers Guide

    Sponsored by: HID Global

    With cyberattacks targeting credentials on the rise, it’s become paramount to include authentication and other identity management tools to your security program. This buyers guide identifies key considerations for organizations to look at when selecting an advanced authentication offering and vendor. Read on to get started.

  • HID DigitalPersona® SSO for Microsoft® Office 365

    Sponsored by: HID Global

    Today’s enterprise leaders are realizing the value of cybersecurity (or rather, the cost of a data breach). To meet the demands of today’s cyberthreats, security leaders are embracing authentication protocols. Read this solution brief to learn more about the challenges of implementing strong authentication, and how to overcome them.

  • Identity Proofing

    Sponsored by: Entrust, Inc.

    Today’s customers and end users demand fast, secure digital interactions from the organizations they do business with. This white paper highlights the key features and capabilities of Entrust Datacard’s ID Proofing offering, designed to provide fast, accurate and fully digital identity proofing. Read on to learn more.

  • Identity Proofing to Accelerate Customer Acquisition and Onboarding

    Sponsored by: Entrust, Inc.

    As the mobile banking industry grows more competitive, each new application user (or non-user) plays a critical role in the bank’s success. This solution brief takes a closer look at the key features and capabilities of Entrust Datacard’s Identity proofing solution, designed to improve security and customer experience.

  • The 10 Tenets of an Effective SASE Solution

    Sponsored by: Palo Alto Networks

    As networks become increasingly dispersed, organizations struggle to keep pace and ensure security, privacy, and integrity. Recently, organizations have begun incorporating secure access service edge (SASE) frameworks. This e-book goes in-depth into what SASE is, and 10 principles required to make them effective.

  • A Comprehensive Guide to Authentication Technologies and Methods

    Sponsored by: Thales

    Given the number of vectors being targeted by hackers, organizations are opting for a variety of focused tools based on need rather than an all-in-one approach to protect their digital identities. Read this comprehensive guide to learn more about the key methods and challenges surrounding authentication.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.