ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Automation’s Rising Tide: How to Manage Bots in Today’s World

    Sponsored by: F5 Networks

    As bot technology, machine learning, and AI continue to evolve, it is more critical than ever for your organization to be prepared to deal with the impact of bots – both good and malicious. This e-book will guide you as you develop a comprehensive, flexible strategy to address the impact of bots. Read on to get started.

  • The Evolution of Zero Trust

    Sponsored by: Banyan Security

    As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.

  • Banyan Security Zero Trust Remote Access Video

    Sponsored by: Banyan Security

    In this video, learn about a singular Zero Trust remote access platform that delivers dynamic trust scoring, continuous authorization and granular access enforcement.

  • Get Your App Ready for the Global B2B Market

    Sponsored by: Okta

    To foster a healthy relationship with enterprise partners and customers, you need to allow those users to use their existing enterprise identities to access your applications or shared resources. In this white paper, learn about 4 ways to integrate your enterprise applications and internal systems with your partners and customers’ identities.

  • 4 Ways to Improve Customer Experience with a Modern Identity Service

    Sponsored by: Okta

    In order to unify the customer experience and drive engagement, there needs to be an identity layer serving as the connective tissue between apps, devices, channels, and experiences. In this white paper, learn how Okta’s modern identity services can help organizations improve their customer experience.

  • Accelerating the Journey to Passwordless Authentication

    Sponsored by: IBM

    A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.

  • Consumer Data Right: Open Banking

    Sponsored by: Ping Identity Corporation

    With consumers growing increasingly reliant on digital services and interfaces, the financial industry is evolving to meet these expectations through open banking interfaces. In this solution brief, explore the Ping Identity Platform, designed to meet Australia’s Open Banking requirements while still providing a seamless user experience.

  • CIS Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • IBM Identity and Access Management Services: Costs and Benefits

    Sponsored by: IBM

    Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.

  • Access Management Vendors: Analyst Report

    Sponsored by: IBM

    SaaS-delivered access management has become the norm, and vendors are including API capabilities for integrating authentication and authorization into applications and services. Gartner recently published a Magic Quadrant report for Access Management, which evaluates and compares various AM providers. Read on to learn more.

  • Automating Identity & Access Management

    Sponsored by: Hitachi ID

    Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.

  • 3 Key Capabilities for Next-Generation Identity and Access Management

    Sponsored by: IBM

    Traditionally, identity and access management (IAM) was designed by engineers, for engineers to be customizable and siloed. Next-generation IAM’s goal is to enhance security by improving on these methods. Explore the IAM “as a service” delivery model and uncover it’s 3 key capabilities. Continue to this webinar to learn more.

  • Simplify, Strengthen and Unify Your Security with Zero Trust Access

    Sponsored by: PortSys

    Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.

  • Structuring an IAM program

    Sponsored by: Hitachi ID

    With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.

  • Now Tech: Authentication Management Solutions, Q3 2018

    Sponsored by: IBM

    Organizations use authentication management to simplify processes, reduce operational costs and enhance customer experience by minimizing friction. But selecting a vendor can be overwhelming.In this Forrester report, explore the features of 26 diverse providers in order to help you find a vendor that meets your organizational needs.

  • The Challenges of Trusted Access in a Cloud-First World

    Sponsored by: Thales

    With over 1,050 participants, the 2019 Thales Access Management Index revealed common security trends, concerns and access management technologies around cloud adoption used by today’s organizations. Download the executive summary to uncover the key findings and takeaways towards secure access management.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Apcela

    Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.

  • RPA Security Best Practices

    Sponsored by: CyberArk Software, Inc

    Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.

  • Cyber Hygiene: Doing the Basics with Microsoft

    Sponsored by: Snow Software

    Cybersecurity is an easily defined term but achieving a secure environment & security protocol takes diligent planning. So, what are the basics of cyber hygiene & what steps must my organization take towards cybersecurity?In this webinar, leverage industry expertise to uncover some of the fundamentals of cyber hygiene.

  • Access Management is Essential for Cloud Transformation

    Sponsored by: Thales

    This infographic highlights some of the key takeaways from the 2019 Thales Access Management Index. Continue reading to uncover the key takeaways as they relate to top access management tools, the role of data breaches in access management adoption & other significant statistics.

  • The Business Case for Securing Robotic Process Automation

    Sponsored by: CyberArk Software, Inc

    As organizations consider Robotic Process Automation (RPA), CISOs and security leaders have a timely opportunity to present a business about applying strong cybersecurity to this transformative technology. In this article, find 3 ways to build the business case for RPA security – centered on protecting privileged access.

  • Integrating Password and Privilege Management for Unix and Linux Systems

    Sponsored by: BeyondTrust Corporation

    With the knowledge that cyberattacks are often targeted towards accounts with privileged access, organizations often include privileged access management (PAM) at the top of their project list. This report uncovers why PAM strategies are critical to a robust security program.

  • Buyer’s Guide for Complete Privileged Access Management (PAM)

    Sponsored by: BeyondTrust Corporation

    Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.

  • Robotic Process Automation Whiteboard Video

    Sponsored by: CyberArk Software, Inc

    Robotic Process Automation (RPA) platforms can provide organizations with great benefits. However, these platforms introduce a new threat vector based on human and non-human identities. In this video, discover 5 security best practices organizations should consider incorporating into their RPA workflows.

  • Cisco Umbrella: Reporting You Can Count On

    Sponsored by: Cisco Umbrella

    Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.