ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • EMA Evaluation Guide to Privileged Access Management (PAM)

    Sponsored by: Remediant

    Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.

  • Remediant Framework Mapping and Assessment

    Sponsored by: Remediant

    The NIST Access Controls framework consists of 23 requirements that should be included in offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.

  • Fortinet Acquires Cloud Security and Networking Innovator OPAQ Networks

    Sponsored by: Fortinet, Inc.

    Secure Access Service Edge (SASE) and Zero Trust Network Architecture (ZTNA) can provide evolved threat protection on their own, but when put together, organizations can be remote ready during this unprecedented time. Read this blog post that details Fortinet’s acquisition of OPAQ, which will allow SASE to meet ZTNA.

  • Cloud Access Security Brokers: Top Vendors & Offerings

    Sponsored by: McAfee

    The popularity of Cloud Access Security Brokers (CASBs) as an effective measure for cloud data protection is on the rise. In order to help you select the right vendor for your unique needs, Gartner conducted a comprehensive analysis of the top CASB vendors and offerings in today’s market – read on to unlock the Magic Quadrant report.

  • Panel Discussion: Securing the Cloud

    Sponsored by: Dell SecureWorks

    The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.

  • Microsoft Teams Guest Access: To Do or Not to Do?

    Sponsored by: Nucleus Cyber

    In this blog, learn how NC Protect provides the context and content awareness to adapt access controls and sharing rights down to the file or chat message level to ensure your employees and guest can collaborate securely.

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: Citrix

    SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.

  • Privileged Account Management for Dummies

    Sponsored by: IBM

    In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).

  • 2019 Report for Identity Governance & Administration

    Sponsored by: IBM

    For the fifth consecutive year, Gartner has named IBM a Leader in the Magic Quadrant for Identity Governance & Administration (IGA). With IBM, clients have access to the broadest set of IGA capabilities on their journey to the cloud.

  • Identity & Access Management from IBM

    Sponsored by: IBM

    Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.

  • A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access

    Sponsored by: IBM

    Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.

  • An overview of IBM’s identity & access management services

    Sponsored by: IBM

    This Forrester study, commissioned by IBM, provides an unbiased look at the potential benefits, costs and risk areas of IBM’s Identity and Access Management (IAM) services. Download the report to unlock the key findings from the study and explore a use case that demonstrates the potential of adopting IBM’s IAM services

  • University Hospital Gets the Most Out of Mobility with Total Access Control

    Sponsored by: PortSys

    For Milton Keynes University Hospital (MKUH), enabling and securing access for every device, regardless of location, became critical as they looked to modernize their operations. In this case study, discover why MKUH decided to partner with PortSys and implement a zero-trust approach to access management in the form of Total Access Control.

  • Credential Stuffing Attacks Threaten Businesses in Asia-Pacific

    Sponsored by: Akamai Technologies

    The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.

  • Predictive Identity: A Key Enabler for a Successful Merger or Acquisition

    Sponsored by: SailPoint Technologies

    This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.

  • Peer Insights: Identity Governance and Administration

    Sponsored by: SailPoint Technologies

    This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.

  • Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition

    Sponsored by: CyberArk Software, Inc

    Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.

  • Identity Governance & Administration (IGA)

    Sponsored by: SailPoint Technologies

    In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.

  • Privileged Access Management

    Sponsored by: CyberArk Software, Inc

    Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.

  • SailPoint Predictive Identity

    Sponsored by: SailPoint Technologies

    AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.

  • Protecting Intellectual Property with Data Access Governance

    Sponsored by: SailPoint Technologies

    In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.

  • SIG - Axcess Financial Customer Story

    Sponsored by: Cisco Umbrella

    In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.

  • Maintain Business Continuity with Aruba's Remote Access Solutions

    Sponsored by: Aruba Networks

    More people than ever before are now working remotely. But everyone still needs secure, reliable access to systems and applications, no matter where they are. How do you open up your network and still keep data secure? In this brief, learn how Aruba’s remote access solutions can help.

  • The Future of Security and Compliance Starts Here

    Sponsored by: SailPoint Technologies

    The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.

  • Intelligent Cloud Identity Platform

    Sponsored by: SailPoint Technologies

    To address the cybersecurity challenges that result from a undergoing a digital transformation, organizations are implementing intelligent identity and access management practices. This solution brief provides an in-depth look at the key features and capabilities of SailPoint’s IdentityIQ platform, read on to see the benefits.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.