ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Research

  • Rethinking Third-party Cyber Risk Management

    Sponsored by: CyberGRX

    In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.

  • CyberArk Privilege Cloud Reduces Risk with PAM SaaS

    Sponsored by: CyberArk Software, Inc

    Creating and executing a successful privileged access security program can seem like a daunting task. Privileged access is pervasive throughout the enterprise and can be difficult to manage without the right tools. In this blog, learn how CyberArk Privilege Cloud can help organizations start their privileged access management journey.

  • Protecting Your Organization from Password Breaches

    Sponsored by: OneLogin

    With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.

  • Advanced AD Bridging for Prodigious IT Gains

    Sponsored by: Centrify Corporation

    Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.

  • Establish Secure DevOps Practices

    Sponsored by: Centrify Corporation

    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • The Anatomy of a Hack: Perception vs. Reality

    Sponsored by: Centrify Corporation

    There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.

  • Zero Trust Privilege for Dummies

    Sponsored by: Centrify Corporation

    To better protect against data breaches, the use of a Zero-Trust model has returned to the spotlight and seen huge growth in adoption. Instead of using the traditional approach of "trust, but verify," the Zero-Trust model implements "never trust, always verify" as its guiding principle. Download Zero Trust Privilege For Dummies to learn more.

  • The 2019 Zero Trust Privilege Maturity Model Report

    Sponsored by: Centrify Corporation

    To provide context around the current state of Zero Trust Privilege, Centrify surveyed 1,300 information security professionals. Download this 2019 report to learn more about the Zero Trust Privilege Maturity Model and discover key findings from the survey.

  • Webinar: Latest Fraud Schemes in Retail and Hospitality

    Sponsored by: Shape Security

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

  • Top 5 Reasons to Put Privilege First

    Sponsored by: CyberArk Software, Inc

    The reality is that no organization can ever fully secure all of their applications and infrastructure. Protection from all of the various methods that attackers may use is impossible; they will get in, it's what they do. In this white paper, learn why prioritizing privileged access should be at the core of every organization's strategy.

  • Securing Hospitality IT Infrastructure

    Sponsored by: CyberArk Software, Inc

    When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.

  • Security and Privacy at Armorblox

    Sponsored by: Armorblox

    Armorblox takes the security and privacy of their customers' data seriously. Download this brief to learn about their natural language platform.

  • Airline Stops Automated Attacks on Web & Mobile

    Sponsored by: Shape Security

    A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.

  • Online Retail Threats Credential Stuffing

    Sponsored by: Shape Security

    In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.

  • Total Access Control Addresses Risk-based Security for Any Device and Application

    Sponsored by: PortSys

    While all companies are concerned about security, those in the financial services industry are especially so. In this case study, learn how a financial services firm was provided risk-based security with PortSys Total Access Control.

  • A Buying Guide for Next-Gen Remote Access

    Sponsored by: Citrix

    In this e-book, discover Citrix Gateway, a next-generation SSL VPN, and the ways it helps enterprise IT better address remote access challenges.

  • Zero Trust Access Video

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.

  • Accelerate ERP Threat Detection

    Sponsored by: Appsian

    Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.

  • Zero Trust Access Today's IT Security Falls Short

    Sponsored by: PortSys

    78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.

  • Safeguarding PeopleSoft Against Direct Deposit Theft

    Sponsored by: Appsian

    In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.

  • Independent Study Pinpoints Significant SCADA/ICS Security Risks

    Sponsored by: Fortinet, Inc.

    Many organizations beyond electric and water utilities have deployed SCADA/ICS as they look to automate their data collection and their equipment. However, the technologies have become high-value targets for hackers. In this research report, explore common SCADA and ICS threats and find recommendations for mitigating the risks they pose.

  • Balancing Fraud Detection and the Customer Experience

    Sponsored by: SAS

    Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.

  • Top 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth Taking

    Sponsored by: RSA Conference

    Designing secure architecture can always be more expensive, time consuming and complicated. But does it make sense to cut corners when hackers invent new attacks every day? Sooner or later, these shortcuts will translate to more harm and backfire. Watch this video from RSA Conference 2019 to learn how to eliminate mistakes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.