ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Zero Trust Access Video

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.

  • Accelerate ERP Threat Detection

    Sponsored by: Appsian

    Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.

  • Zero Trust Access Today's IT Security Falls Short

    Sponsored by: PortSys

    78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.

  • Safeguarding PeopleSoft Against Direct Deposit Theft

    Sponsored by: Appsian

    In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.

  • NIST SP 800-171 and CUI

    Sponsored by: TITUS

    NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be compliant with DFARS Part 252.204-7012. In this solution brief, learn how Titus can help contractors comply with these requirements.

  • Winning the Battle Over Passwords

    Sponsored by: OneLogin

    Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.

  • Can Cryptography Save Our Elections

    Sponsored by: RSA Conference

    Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.

  • Understand How SSO and MFA Improve Security

    Sponsored by: OneLogin

    IT departments are in a tough spot when it comes to security. The most common attacks are aimed at obtaining user credentials, with the password being the critical element. In this white paper, learn why secure SSO and risk-aware MFA are the golden keys to protecting your organization's sensitive information.

  • Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization

    Sponsored by: FairWarning

    1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this ebook, explore 5 of these profiles and learn how to protect your organization from each.

  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse in Salesforce

    Sponsored by: FairWarning

    Privileged Salesforce users are necessary to every organization however, with the ability to make nearly unlimited changes; they place your organization at tremendous risk. In this white paper, explore 4 best practices for preventing privileged user abuse in Salesforce.

  • Learn How to Control Access to Sensitive Data in Your Data Lake

    Sponsored by: Okera

    In this webinar, explore how you can better control access to sensitive data at scale in your data lake with Okera Active Data Access Platform. Discover how Okera can help resolve the longstanding friction between access and governance, and decide if Okera is right for your organization.

  • Okera reduces friction for datadriven initiatives with global data access management

    Sponsored by: Okera

    In this report from 451 Research, learn how Okera's global data access management platform can help reduce friction in IT enterprise environments with finer grained access controls and increased visibility. Explore Okera's strengths and weaknesses, and decide if a data access platform is right for your organization.

  • TeamViewer Tensor Integration Webinar

    Sponsored by: TeamViewer

    TeamViewer Tensor has changed the paradigm of remote connectivity by allowing you to assign appropriate user access rights to employees so they can get full desktop access to their work computers and network servers. In this webcast, explore key benefits of TeamViewer Tensor.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: Comforte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • Best Practices for Securing Privileged Access

    Sponsored by: Hitachi ID

    In this resource, discover all of the key benefits and capabilities of Hitachi ID's Privileged Access Manager.

  • Hitachi ID Group Manager

    Sponsored by: Hitachi ID

    Hitachi ID Group Manager helps make the administration of security groups and mail distribution lists faster, cheaper and more secure. To learn more, download this product brief and discover all of the ways Hitachi ID Group Manager can benefit your organization today.

  • Hitachi ID Privileged Access Manager

    Sponsored by: Hitachi ID

    In this product overview, learn about the Hitachi ID Privileged Access Manager and how it can secure access to high risk accounts and groups, replace static, shared passwords with periodically changing random values, and much more.

  • Hitachi ID Privileged Access Manager

    Sponsored by: Hitachi ID

    Download this white paper to learn more about the best practices for processes, policies and technology used to secure access to privileged accounts and other elevated privileges.

  • Hitachi ID Privileged Access Management

    Sponsored by: Hitachi ID

    This white paper identifies why it is essential for public and private sector organizations to select an integrated PAM platform that can secure all types of privileged access. Read on to learn more.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    With Hitachi Identity Manager, organizations can move access changes out of IT to a mix of automated, HR-driven processes and request/approval workflows driven by business users. Download this solution brief to learn more about the benefits and capabilities of Identity Manager today.

  • TeamViewer Tensor Conditional Access

    Sponsored by: TeamViewer

    Download this infographic to learn how a rule-based engine like a firewall can help you prevent unauthorized remote access and protect your corporate network.

  • Advanced Authentication Technologies for Detecting Real-time Threats to Banks

    Sponsored by: HID Global

    Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • Who needs security orchestration, automation and response?

    Sponsored by: SearchSecurity.com

    Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.