ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Best Practices for Managing and Understanding Mobile Authentication

    Sponsored by: SearchSecurity.com

    In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.

  • How to tackle cloud, IAM, and digital certificate problems in your organization

    Sponsored by: SearchSecurity.com

    In this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise.

  • Rethink Defense-In-Depth Security Model For BYOD

    Sponsored by: SearchSecurity.com

    This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.

  • WLAN Access Control and Wi-Fi Network Needs

    Sponsored by: SearchSecurity.com

    This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.

  • After Antimalware: Moving Toward Endpoint Antivirus Alternatives

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.

  • How to Thwart Privilege Creep with Access Reviews

    Sponsored by: SearchSecurity.com

    In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.

  • Handbook: Identity and Access Management

    Sponsored by: SearchSecurity.com

    In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.

  • Global Security University: IAM Integration Classroom

    Sponsored by: IBM

    This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • Identity and Access Management Buyer's Guide

    Sponsored by: IBM

    This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.

  • Network Rightsizing Blueprint for the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.

  • Is Your Platform Secure? Really?

    Sponsored by: IBM

    This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.

  • What you didn’t know about Certificate-Based Authentication

    Sponsored by: OpenTrust

    You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.

  • Dell Mobile Clinical Computing - AlwaysOn Point of Care

    Sponsored by: Dell and VMware

    This resource discusses why modernization of the point-of-care desktop has become an urgent health IT priority. Inside, learn how the right virtualization architecture can give caregivers the information access and protection that they need.

  • Overcoming Security Breaches and Minimizing the Impact

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Securing SharePoint: SharePoint Security Best Practices

    Sponsored by: Thawte Inc.

    This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more.

  • Identity and Access Management Security Live Chat Transcript

    Sponsored by: SailPoint Technologies

    In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • Gartner Magic Quadrant for Unified Threat Management

    Sponsored by: Sophos

    Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Build Your Identity And Access Management Strategy

    Sponsored by: Symplified

    This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.

  • Complete and Scalable Access Management

    Sponsored by: Oracle Corporation UK Ltd

    This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.

  • Achieve secure mobile access to enterprise applications

    Sponsored by: Oracle Corporation UK Ltd

    This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.

  • Oracle Mobile and Social Service: The Next Step in IAM

    Sponsored by: Oracle Corporation UK Ltd

    As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.

  • Information Security Magazine - April 2013

    Sponsored by: SearchSecurity.com

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.