ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • An admin's guide to secure remote access

    Sponsored by: Zoho

    Secure remote access allows controlled access to an enterprise’s network, mission-critical systems, or any confidential data – enabling IT teams to provide secure and reliable access to employees, regardless of where they’re working. Read this e-guide to learn more about secure remote access strategies, best practices and more.

  • Password Security Guidelines

    Sponsored by: TechTarget

    In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.

  • Evolution of PAM

    Sponsored by: Zoho

    In this Forrester expert-led webinar, join Sean Ryan, Senior Analyst at Forrester, and Praveen Kumar, Product Expert – PAM Suite for a discussion around the evolution of Privileged Access Management (PAM). Watch now to get started.

  • Cyberark Identity Single Sign-On

    Sponsored by: CyberArk Software, Inc

    As cloud infrastructures and SaaS applications continue to grow in popularity and complexity, managing and securing access to these resources becomes increasingly difficult. Read this solution brief to learn about CyberArk’s approach to identity and access management (IAM) and single sign-on (SSO).

  • A Computer Weekly e-Guide to IAM

    Sponsored by: ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • ZTNA: Default to Deny, Never Trust, Always Verify

    Sponsored by: Palo Alto Networks

    Contrary to popular belief, Zero Trust and Zero Trust Network Access (ZTNA) are entirely different. Watch this webinar to learn more about the differences between them, the challenges ZTNA addresses, how organizations can embrace ZTNA, the key features of Palo Alto’s Prisma Access, and more.

  • Webinar - Securing IAM: The New Cloud Perimeter is Broken

    Sponsored by: Palo Alto Networks

    It’s no secret that the cloud is vulnerable, but professionals must become aware of just how vulnerable the cloud can be. In this webinar, learn how one simple misconfiguration in identity and access management allowed researchers to compromise a massively-scaled cloud environment and bypass just about every security control.

  • Testing New Publishing System

    Sponsored by: ERROR TEST

    Preparing this resource to be approved and published when we do the switch to the new publishing system.

  • Cover Your Bases: Best Practices for Protecting Remote Work

    Sponsored by: Okta

    You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.

  • Computer Weekly – 19 January 2021: The UK's struggle with digital schooling

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.

  • Axis Case Study: Cardenas Markets Case Study / 1 Prabash Coswatte, Former Ciso (Cardenas) How Axis Keeps A Grocery Chain Well-Stocked And Well-Protected

    Sponsored by: Axis Security

    For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.

  • Overcoming The Legacy Vpn Dilemma Zero Trust Access With Application Access Cloud

    Sponsored by: Axis Security

    Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access tools enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.

  • Iot Platform Leader Armis Eliminates Dependency On Vpn Technology, Adopts Axis Zero Trust Solution

    Sponsored by: Axis Security

    Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.

  • Axis Security Video

    Sponsored by: Axis Security

    VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.

  • Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.

  • On The Radar: Axis Security Takes A Different Approach To Zero-Trust Access

    Sponsored by: Axis Security

    Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.

  • Enabling Partners With Simple, Private Application Access

    Sponsored by: Axis Security

    Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.

  • Axis Security Video 1

    Sponsored by: Axis Security

    Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.

  • Blackberry Cyber Suite

    Sponsored by: BlackBerry

    In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • Barracuda CloudGen Access

    Sponsored by: Barracuda

    Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.

  • 5 steps to secure home devices & improve productivity for remote work

    Sponsored by: Barracuda

    Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.

  • Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security

    Sponsored by: Atakama

    The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.

  • Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data

    Sponsored by: Atakama

    As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.

  • Why You Should Care About the NY DFS Cybersecurity Regulation

    Sponsored by: Atakama

    Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences