ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Securely Maintain Business Continuity with A Remote Workforce

    Sponsored by: Cybereason

    In response to social distancing recommendations, organizations have had to rapidly enable their entire staff to work remotely. However, such a dramatic shift can often lead to security oversights, which result in vulnerabilities. Read on to unlock a checklist and ensure your organization didn’t miss any vital preparation steps.

  • Zero Trust’s Blind Spot: How Proactive Cyber Hygiene Preserves Zero Trust

    Sponsored by: Automox

    Although zero-trust has grown in popularity, it should only serve as a piece of the cybersecurity puzzle rather than a standalone solution. In this white paper, discover why organizations should look to make widespread security improvements in order to fill in the gaps of zero-trust and get the most out of their security tools.

  • Building Cloud Services for Security: 3 Common Misconfigurations

    Sponsored by: DivvyCloud

    Ensuring the secure configuration of a distributed set of cloud services is a critical piece to cloud transformation. In fact, most risk areas related to cloud come from security misconfigurations. This white paper highlights 3 common misconfigurations and explores ways to fix them or prevent them from happening.

  • Work from Home: An Application and Identity Management Guide

    Sponsored by: EvolveIP

    Identity and access management (IAM) has enabled IT professionals to maintain security at scale, allowing organizations to continue their digital transformations. In this white paper, take a closer look into the methods and facets that make up IAM, as well as how to integrate remote workers.

  • Remote Work Considerations: Securing the New Corporate Network

    Sponsored by: EvolveIP

    Today’s environments have embraced SaaS offerings, realizing scalability and cost benefits. However, each additional SaaS provider adds another disparate system to the environment, potentially exposing security vulnerabilities. In this white paper, explore key considerations your security team should make when enabling remote workers.

  • Enable and Secure Remote Work During the COVID-19 Pandemic

    Sponsored by: Barracuda

    The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.

  • 4 Steps to Cloud Access Management

    Sponsored by: Thales

    Today’s organizations rely on cloud-based applications as a critical aspect of their environment. However, deliberate security considerations need to be made in order to protect the sensitive data in these cloud tools. In this white paper discover 5 common challenges and 4 actions organizations can take to full cloud access management.

  • Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations

    Sponsored by: Okta

    For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.

  • SafeNet Trusted Access: Cloud-based Access Management as a Service

    Sponsored by: Thales

    While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.

  • A Guide to Verifying Users for Marketplaces

    Sponsored by: Vonage

    Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.

  • Rethinking API Security

    Sponsored by: Okta

    APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.

  • Unlocking Omni-Channel with Unified Customer Identity

    Sponsored by: Okta

    To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.

  • A Guide to Verifying Users in Financial Services

    Sponsored by: Vonage

    Learn how banks and fintech companies can securely onboard customers at global scale with phone verification.

  • 7 Steps to SSO + MFA to On-Prem Apps

    Sponsored by: Okta

    Learn how to use Okta Access Gateway to control access to Hybrid IT and on-prem web applications, all without changing how your on-prem web apps work today.

  • Secure Access to On-prem Apps & Hybrid Cloud Security

    Sponsored by: Okta

    In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.

  • CA SiteMinder Migration Guide

    Sponsored by: Okta

    To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.

  • Access Management Handbook

    Sponsored by: Thales

    The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.

  • Identity Governance for File Shares

    Sponsored by: SailPoint Technologies

    Learn how IdentityIQ File Access Manager can help you securely manage access to your sensitive data and files in the cloud and on-premises.

  • Magic Quadrant for Identity Governance and Administration

    Sponsored by: SailPoint Technologies

    Like most security tools, identity governance and administration (IGA) is under pressure to provide cloud-based services to meet customer need. In this Magic Quadrant report, Gartner evaluates key IGA offerings in today’s market to help you determine the right vendor for your needs. Read on to unlock the full report.

  • Finds Cost- and Time-Savings with IdentityNow

    Sponsored by: SailPoint Technologies

    Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.

  • Mitigating Data Breach Risk with Identity Governance for Files

    Sponsored by: SailPoint Technologies

    Rather than hope to avoid a breach, preparing for the inevitable occurrence by planning ahead will enable your organization to mitigate potential risks and respond effectively in the event of a breach. This solution brief take’s a closer look at SailPoint’s method for mitigating risk by focusing on access control. Read on to learn more.

  • CyberArk Blueprint for Privileged Access Management Success

    Sponsored by: CyberArk Software, Inc

    In today’s threat landscape, external attackers and malicious insiders routinely exploit privileged accounts to steal sensitive data or cause operational disruptions. To address this, IT security leaders need to rethink their privileged access management (PAM) strategy. Read on to discover a blueprint for PAM success.

  • How to Know It’s Time to Change Your Identity Vendor

    Sponsored by: SailPoint Technologies

    Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.

  • 8 Tips to Prevent Oversharing and Insider Threats in Microsoft Teams

    Sponsored by: Nucleus Cyber

    Many organizations are expressing concerns that the rapid roll out of Microsoft Teams is potentially leaving them exposed to data breaches and insider threats. In this white paper, explore a list of 8 tips that can help you prevent oversharing and the potential for insider threats in Microsoft Teams.

  • PortSys Delivers Clientless Citrix Desktops with Total Access Control

    Sponsored by: PortSys

    In this resource, learn about Total Access Control (TAC), and find out how its features like advanced SSO can help you further strengthen Citrix Workspace and desktop security with a Zero-Trust approach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.