ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Building the Business Case for Strong Authentication

    Sponsored by: HID Global

    To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.

  • The Convergence Of Physical And Logical Access: What It Really Means For An Organization's Security

    Sponsored by: HID Global

    For many security professionals, recent high-profile data breaches have shifted attention to external cyberthreats. In this white paper, learn how by addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency.

  • Case Study: Columbia County Sheriff

    Sponsored by: HID Global

    The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.

  • General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation

    Sponsored by: HID Global

    As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.

  • Prepare for Battle: Building an Incident Response Plan

    Sponsored by: Rapid7

    Laying a foundation for threat response allows IT organizations and their partners to respond to incidents as effectively and efficiently as possible. Creating and testing an incident response (IR) plan gives you that foundation. In this e-book, explore 4 steps to building and testing a successful IR plan.

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • IAM: Key to security and business success in the digital era

    Sponsored by: ComputerWeekly.com

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • How to Keep your Enterprise Safe by Improving Password Policies

    Sponsored by: TechTarget

    In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.

  • Improve End-to-end Security with Aruba Clearpass

    Sponsored by: Aruba Networks

    In this resource, learn how to protect all devices corporate, IoT, BYOD- wired and wirelessly to tighten up end-to-end security from unauthorized users.

  • 5 Reasons Enterprises Need a New Access Model

    Sponsored by: Akamai Technologies

    As VPNs, proxies, and remote desktops proliferate, businesses need a new way to manage network access to keep this perimeter safe. Learn the top 5 reasons you should consider a new application access management model.

  • CW Buyer's Guide to Security Analytics

    Sponsored by: ComputerWeekly.com

    Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.

  • Identity and Access Management Tools to Look Out For

    Sponsored by: Okta

    Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.

  • Authentication 101: What You Need to Know

    Sponsored by: HYPR

    What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.

  • How the Cloud Access Security Broker Space Is Evolving

    Sponsored by: Palerra Inc.

    The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.

  • Defend your Organization with Advanced SIEM and Privileged Account Controls

    Sponsored by: Splunk

    As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Five Critical Rules for Firewall Management: Lessons from the Field

    Sponsored by: Dell SecureWorks

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.

  • Locking up the Cloud with IAM

    Sponsored by: SearchCloudSecurity.com

    In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.

  • Computer Weekly: Robots at Your Service

    Sponsored by: ComputerWeekly.com

    Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.

  • Your Role in AWS Security

    Sponsored by: SearchAWS

    This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.

  • Prevent Fraud and Improve the User Experience with Mobile Access Management

    Sponsored by: IBM

    This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.

  • Aligning your Enterprise Identity and Access Management Strategy

    Sponsored by: DLT Solutions

    This expert e-guide covers how you can align identity and access management with CIO and business priorities.

  • Identity and Access Management (IAM) in the Cloud

    Sponsored by: DLT Solutions

    This expert e-guide explores the growing market for cloud-based identity and access management.

  • Mobile Security Best Practices in a Healthcare Setting

    Sponsored by: Insight

    This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.

  • What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?

    Sponsored by: IBM

    Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.