ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Privileged Account Management for Dummies

    Sponsored by: IBM

    In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).

  • 2019 Report for Identity Governance & Administration

    Sponsored by: IBM

    For the fifth consecutive year, Gartner has named IBM a Leader in the Magic Quadrant for Identity Governance & Administration (IGA). With IBM, clients have access to the broadest set of IGA capabilities on their journey to the cloud.

  • Identity & Access Management from IBM

    Sponsored by: IBM

    Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.

  • A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access

    Sponsored by: IBM

    Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.

  • An overview of IBM’s identity & access management services

    Sponsored by: IBM

    This Forrester study, commissioned by IBM, provides an unbiased look at the potential benefits, costs and risk areas of IBM’s Identity and Access Management (IAM) services. Download the report to unlock the key findings from the study and explore a use case that demonstrates the potential of adopting IBM’s IAM services

  • Credential Stuffing Attacks Threaten Businesses in Asia-Pacific

    Sponsored by: Akamai Technologies

    The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.

  • Predictive Identity: A Key Enabler for a Successful Merger or Acquisition

    Sponsored by: SailPoint Technologies

    This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.

  • Peer Insights: Identity Governance and Administration

    Sponsored by: SailPoint Technologies

    This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.

  • PRIVILEGED ACCESS MANAGEMENT (PAM) AS A SERVICE FOR DUMMIES, CYBERARK SPECIAL EDITION

    Sponsored by: CyberArk Software, Inc

    Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.

  • Identity Governance & Administration (IGA)

    Sponsored by: SailPoint Technologies

    In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.

  • Privileged Access Management

    Sponsored by: CyberArk Software, Inc

    Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.

  • SailPoint Predictive Identity

    Sponsored by: SailPoint Technologies

    AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.

  • Protecting Intellectual Property with Data Access Governance

    Sponsored by: SailPoint Technologies

    In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.

  • SIG - Axcess Financial Customer Story

    Sponsored by: Cisco Umbrella

    In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.

  • Maintain Business Continuity with Aruba's Remote Access Solutions

    Sponsored by: Aruba Networks

    More people than ever before are now working remotely. But everyone still needs secure, reliable access to systems and applications, no matter where they are. How do you open up your network and still keep data secure? In this brief, learn how Aruba’s remote access solutions can help.

  • The Future of Security and Compliance Starts Here

    Sponsored by: SailPoint Technologies

    The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.

  • Intelligent Cloud Identity Platform

    Sponsored by: SailPoint Technologies

    To address the cybersecurity challenges that result from a undergoing a digital transformation, organizations are implementing intelligent identity and access management practices. This solution brief provides an in-depth look at the key features and capabilities of SailPoint’s IdentityIQ platform, read on to see the benefits.

  • SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise

    Sponsored by: SailPoint Technologies

    The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.

  • SailPoint Identity Now: Certification Creation

    Sponsored by: SailPoint Technologies

    Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.

  • Privileged Access Management Policy Template

    Sponsored by: Thycotic

    In order to protect privileged accounts against misuse, organizations are establishing privileged access management (PAM) policies. The following guide highlights a 10-step process for customizing a PAM policy template, designed to help your team build a policy based around your unique security and compliance requirements.

  • SailPoint Identity Hub: Search, Track & Manage Access

    Sponsored by: SailPoint Technologies

    The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.

  • Five Ways to Strengthen AWS Managed Services Security With CyberArk

    Sponsored by: CyberArk Software, Inc

    Discover 5 ways CyberArk can help reduce privileged access security risk, improve visibility and control, and simplify operations

  • Identity Governance for Workday

    Sponsored by: SailPoint Technologies

    In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.

  • Lockdown Lessons: Shoring up Your Network and Security Policies

    Sponsored by: Webroot

    Organizations have been required to create a sense of urgency around the review and possible rebuild of their network security. Indefinite remote work has placed architects in a fire storm, and without the proper defense and policy, your network could be in trouble. Read these 3 lockdown lessons to learn more.

  • SailPoint Identity Now: Certification Process Overview

    Sponsored by: SailPoint Technologies

    In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.