ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • CCPA and Identity Verification

    Sponsored by: IDology

    As 2020 approaches, companies should view CCPA as an opportunity to further engage with their customers, rather than an obstacle. In order to adhere to the requirements, implementing policies that follows the CCPA timeline is imperative.Download this whitepaper to discover why identity verification is so critical to ensuring compliance.

  • Automating Identity & Access Management

    Sponsored by: Hitachi ID

    Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.

  • Simplify, Strengthen & Unify Your Security with Zero Trust Access

    Sponsored by: PortSys

    Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructureIn this data sheet, uncover the benefits & challenges of incorporating a zero-trust approach & gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.

  • Structuring an IAM program

    Sponsored by: Hitachi ID

    With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.

  • The Challenges of Trusted Access in a Cloud-First World

    Sponsored by: Thales

    With over 1,050 participants, the 2019 Thales Access Management Index revealed common security trends, concerns and access management technologies around cloud adoption used by today’s organizations. Download the executive summary to uncover the key findings and takeaways towards secure access management.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Apcela

    Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.

  • Securing the Enterprise’s Cloud Workloads on Microsoft Azure

    Sponsored by: Cyber-Ark Software

    Download this white paper to learn how CyberArk Privileged Access Security can be used to proactively protect privileged access in Microsoft Azure cloud environments.

  • RPA Security Best Practices

    Sponsored by: CyberArk Software, Inc

    Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.

  • CyberArk Alero

    Sponsored by: Cyber-Ark Software

    As businesses continue to rely on remote vendors to manage portions of their IT infrastructure, providing privileged access to off-site staff becomes increasingly critical & traditional services aren’t designed to meet this challenge. Read on to learn more about a service designed to provide secure infrastructure access to remote devices.

  • Cyber Hygiene: Doing the Basics with Microsoft

    Sponsored by: Snow Software

    Cybersecurity is an easily defined term but achieving a secure environment & security protocol takes diligent planning. So, what are the basics of cyber hygiene & what steps must my organization take towards cybersecurity?In this webinar, leverage industry expertise to uncover some of the fundamentals of cyber hygiene.

  • Access Management is Essential for Cloud Transformation

    Sponsored by: Thales

    This infographic highlights some of the key takeaways from the 2019 Thales Access Management Index. Continue reading to uncover the key takeaways as they relate to top access management tools, the role of data breaches in access management adoption & other significant statistics.

  • The Business Case for Securing Robotic Process Automation

    Sponsored by: CyberArk Software, Inc

    As organizations consider Robotic Process Automation (RPA), CISOs and security leaders have a timely opportunity to present a business about applying strong cybersecurity to this transformative technology. In this article, find 3 ways to build the business case for RPA security – centered on protecting privileged access.

  • Remote Vendor Access: A Growing Attack Vector

    Sponsored by: Cyber-Ark Software

    Organizations today rely on 3rd party vendors more than ever. Although these arrangements can provide valuable services, they also bring with them significant security considerations and risk. In this white paper, learn about CyberArk Alero which is designed to provide fast, easy and secure privileged access for remote vendors.

  • Integrating Password and Privilege Management for Unix and Linux Systems

    Sponsored by: BeyondTrust Corporation

    With the knowledge that cyberattacks are often targeted towards accounts with privileged access, organizations often include privileged access management (PAM) at the top of their project list. This report uncovers why PAM strategies are critical to a robust security program.

  • Best Practices for Securing Robotic Process Automation

    Sponsored by: Cyber-Ark Software

    Robotic Process Automation (RPA) is different than traditional business automation, and these differences introduce a growing security challenge: securing the access of credentials used by software robots. In this white paper, explore 5 best practices for securing robot privileged credentials and access.

  • Buyer’s Guide for Complete Privileged Access Management (PAM)

    Sponsored by: BeyondTrust Corporation

    Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.

  • Robotic Process Automation Whiteboard Video

    Sponsored by: CyberArk Software, Inc

    Robotic Process Automation (RPA) platforms can provide organizations with great benefits. However, these platforms introduce a new threat vector based on human and non-human identities. In this video, discover 5 security best practices organizations should consider incorporating into their RPA workflows.

  • Cisco Umbrella: Reporting You Can Count On

    Sponsored by: Cisco Umbrella

    Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.

  • Just-In-Time (JIT) Privileged Access Management (PAM)

    Sponsored by: BeyondTrust Corporation

    Always-on privileged access presents a massive risk surface to data breaches, & traditional security is limited in their detection against these threats. A strategy called just-in-time (JIT) privileged access can help by limiting the time an account has certain access. Read more about JIT & why you should include it in your policy.

  • Privileged Access Threat Report 2019

    Sponsored by: BeyondTrust Corporation

    2020 is approaching and issues around employee & vendor access are not going away. But it’s possible to improve the visibility of threats & increase the confidence over an IT environment’s security. That’s where Privileged Access Management (PAM) comes into play. View this report for tips on managing insider access, vendor risk & more.

  • Buyer’s Guide for Certificate Lifecycle Automation

    Sponsored by: AppViewX

    The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.

  • Protecting Privileged Access Is Critical to the Protection of a Company’s Crown Jewels

    Sponsored by: CyberArk Software, Inc

    In this infographic from Privileged Access Security for Dummies, discover some tips & best practices when it comes to protecting your company’s data. Learn how to: Secure critical information, reduce cyberattack risk, and take preventative security action.

  • 6 Security Checkpoints to Consider Along Your Organization’s Cloud Journey

    Sponsored by: CyberArk Software, Inc

    Whether you’re on a journey to a public, private or hybrid cloud environment, relying on DevOps or leveraging SaaS applications, understanding cloud computing vulnerabilities is critical. In this infographic, discover 6 cloud vulnerabilities and steps for securing them.

  • Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath

    Sponsored by: LexisNexis® Risk Solutions

    In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.

  • Mobile Fraud Detection: Top 4 Threats to the Mobile Channel

    Sponsored by: LexisNexis® Risk Solutions

    As the mobile channel increasingly takes center stage, rising security concerns in retail, payments and financial services suggest mobile fraud detection has never been more important. In this white paper, explore 4 trends that are reshaping the threat landscape around the world.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.