ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Mobile Fraud Detection: Top 4 Threats to the Mobile Channel

    Sponsored by: LexisNexis® Risk Solutions

    As the mobile channel increasingly takes center stage, rising security concerns in retail, payments and financial services suggest mobile fraud detection has never been more important. In this white paper, explore 4 trends that are reshaping the threat landscape around the world.

  • 2019 True Cost of Fraud Study

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study explores the evolution, expansion and cost of fraud to deliver insights and recommendations on how to effectively sustain your business, successfully manage fraud risks and strengthen customer trust and loyalty. Download the report to explore key findings.

  • Retailers are Creating More Opportunity for Fraudsters

    Sponsored by: LexisNexis® Risk Solutions

    Fraudster are exploiting digital channels and seizing more opportunities across a diverse set of retailers. Learn more about fraud attempts, targets, driving factors, top challenges and recommendations in this infographic.

  • A Framework for Cybersecurity and Compliance

    Sponsored by: OneNeck IT

    In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.

  • Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In

    Sponsored by: LexisNexis® Risk Solutions

    The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.

  • Cybercrime Networks: How Businesses Can Join Forces to Beat Fraudsters

    Sponsored by: LexisNexis® Risk Solutions

    Just because businesses are hardening their defenses against cybercrime, doesn’t mean fraudsters are giving up. Instead, they’re getting smarter — and taking a much more collaborative approach. In this resource, learn how businesses can join together to defend against fraud.

  • CyberArk Privilege Cloud Whiteboard Video

    Sponsored by: CyberArk Software, Inc

    CyberArk Privilege Cloud can help your organization discover and manage privileged credentials on-premises, in the cloud, and hybrid environments. In this video, Andrew Silberman from CyberArk discusses the benefits of CyberArk Privilege Cloud and helps you evaluate if it is a good fit for your organization.

  • True Cost of Fraud Webinar

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.

  • Network Security – A Patchwork Quilt Bursting at the Seams

    Sponsored by: PortSys

    In this article, learn about a more efficient way for an organization to manage their network security from top to bottom.

  • Pogo Paradox: Is Your Infrastructure Your Worst Enemy?

    Sponsored by: PortSys

    In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.

  • All Access Is Not Created Equal

    Sponsored by: PortSys

    “Context of Access” involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more. Discover why – to securely allow for new business innovation – organizations must understand Context of Access and have the technology to support it.

  • The Superpower of “Yes! But…”

    Sponsored by: PortSys

    There was a time not so long ago when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO! In this blog post, learn how and why security’s superpower of “NO!” turned into “Yes! But…”

  • Identity Is Not Security – Context Is King

    Sponsored by: PortSys

    Identity is still important to security, but identity alone is NOT security. By binding user credentials with security policies based on the multiple factors within context of access, organizations today can significantly strengthen the protection of their enterprise resources, and ultimately, their bottom line. Read this article to learn more.

  • Consolidate your Access Security Strategy with Integrated Single Sign-On

    Sponsored by: Citrix

    In this webinar, discover Citrix’s Access Control service that helps consolidate VPN, single sign-on and granular security controls for SaaS, web and virtual applications, as well as web filtering and web isolation controls for the Internet.

  • Computer Weekly – 8 October 2019: Showcasing the potential of 5G

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.

  • Five Reasons to Prioritize Privileged Access Management as-a-Service

    Sponsored by: CyberArk Software, Inc

    Privileged Access Management (PAM) as-a-Service is becoming a popular method for deploying security solutions for a variety of reasons. Download this white paper for the top 5.

  • When MDM is Not Enough: Context is Key

    Sponsored by: PortSys

    While Mobile Device Management (MDM) helps to manage a smartphone or tablet device to ensure that device is valid and approved, beyond this, many organizations still rely on usernames and passwords to determine access privilege. Read this article for reasons on why access control is so important when managing mobile devices today.

  • Improving Lives Around the World through Easier Access to Knowledge

    Sponsored by: PortSys

    Learn how Research4Life was able to use PortSys Total Access Control to manage access across all programs and make the lives of end users around the world easier.

  • PortSys Total Access Control Case Study

    Sponsored by: PortSys

    While all companies are concerned about security, those in the financial services industry are especially so. Read this case study to see how a financial services firm used PortSys Total Access Control to address risk-based security for their devices and applications.

  • Take a Better TAC to Protect RDP

    Sponsored by: PortSys

    Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.

  • Making the Business Case for Zero Trust Access

    Sponsored by: PortSys

    Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.

  • Zero Trust Access What Does it Mean?

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • New Tech: Early Adopters Find Smart 'Zero Trust' Access Improves Security Without Stifling Innovation

    Sponsored by: PortSys

    Abused logon credentials continue to fuel the never-ending escalation of cyberattacks. However, the Zero Trust approach could be well on its way to changing this. In this blog, uncover key findings from a recent discussion Byron Acohido of The Last Watchdog, had with PortSys' CEO Michael Oldham about Zero Trust.

  • Supporting NERC CIP Compliance

    Sponsored by: Claroty

    Electric industry asset owners are subject to mandatory cybersecurity regulations known as the NERC CIP standards. In this white paper, learn how Claroty's fully integrated platform supports entities' compliance efforts while helping to improve the cybersecurity and operational reliability of power generation and transmission systems.

  • Securing Transportation Infrastructure

    Sponsored by: Cyber-Ark Software

    Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.