ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Rights Research

  • Executive Summary 2020 Thales Access Management Index

    Sponsored by: Thales

    The 2020 Access Management Index explores access management practices within businesses and the use and importance of two-factor authentication, smart SSO and cloud access management tools. Read on to uncover the key findings.

  • Hot Topic Live: Eileen Jennings-Brown

    Sponsored by: Okta

    COVID-19 has been a pivotal event in reshaping not just where we work, how we work or who we work with, but what works. In this Future of Work episode, Eileen Jennings-Brown discusses how her organization, Wellcome Trust, prepared for remote working and how her team is preparing for further disruption in the future.

  • 5 Identity Attacks that Exploit Your Broken Authentication

    Sponsored by: Okta

    Compromised credentials are the leading cause of data beaches. These credentials can be compromised through a number of attacks, including phishing, credential stuffing and password spraying. In this infographic, learn how your organization can defend against data breaches with strong authentication.

  • Businesses at Work (from Home) 2020 Edition

    Sponsored by: Okta

    Organization around the world have reacted to the pandemic quickly, rolling out remote communication apps, extending VPNs, and adding MFA to ensure the productivity, connectivity, and security of their (now) remote workforces. In this report, 2020 Business at Work (from Home), take a closer look at the fastest growing apps and tools.

  • Customer Identity and Access Management - Deciding Between Build vs Buy

    Sponsored by: Akamai Technologies

    This webinar explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations.

  • Aruba ESP With Zero Trust Security: Security for the Edge

    Sponsored by: Aruba Networks

    In this brief, learn how Aruba ESP with Zero Trust Security can help improve an organization’s overall network security posture by applying a more rigorous set of security best practices and controls to previously trusted network resources.

  • Remote Access Solution Guide

    Sponsored by: Extreme Networks

    More now than ever, modern-day problems require modern-day solutions. This is especially true for supporting remote workers. In this solution brief, learn how Extreme Networks can help support remote branches, teleworkers and distance learners with their multiple hardware and software-based solutions.

  • Secure and Contextual Access to Apps and Data

    Sponsored by: Citrix

    The dissolution of the traditional perimeter means that legacy security products don’t meet today’s requirements. In this brief, learn how Citrix Access Control can help meet today’s requirements by following the zero-trust framework to help consolidate point products that offer VPN, SSO, web filtering and browser isolation as separate offerings.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

  • Fuze: Unified Communications Security

    Sponsored by: Fuze

    Security and privacy requirements are extremely important when it comes to business communications. In this white paper, learn how a defense-in-depth approach is employed across the Fuze platform whereby multiple layers of security work together to deliver reliable service in a trusted environment.

  • To Enable Zero Trust, Rethink Your Firewall Strategy

    Sponsored by: VMware

    IT organizations are spending more to secure their networks however, these investments are not always paying off. To better understand the challenges that businesses are facing in securing their internal network’s east-west traffic, VMware commissioned Forrester Consulting to conduct a survey. Download this report to explore key findings.

  • Zero-Trust in Practice

    Sponsored by: Gigamon

    In reality, a Zero Trust architecture goes beyond “trust no one” and “build micro-perimeters around your data”, and requires organizations define their own framework, policies and practices. As a result, no two Zero Trust implementations are alike. Download this webcast to learn more.

  • Secure Transformation: Replacing Remote Access VPN with Prisma Access

    Sponsored by: Palo Alto Networks

    Remote access VPN has been an enterprise network staple for years; however, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. In this white paper, learn about the limitations of VPNs and how Prisma Access can help provide secure access to all applications.

  • Using IAM and PAM to Enable and Secure Remote Work During the COVID-19 Lockdown

    Sponsored by: Hitachi ID

    In this document, learn how identity and access management (IAM) and privileged access management (PAM) systems can help with some of the security challenges created by the current work from home climate.

  • Business Continuity – Are You Putting Your Company at Risk with RDP?

    Sponsored by: PortSys

    RDP has been a favorite target of hackers for a long time, even before this pandemic. Many organizations may think that their default RDP security methods are good enough. But most RDP deployments don’t even incorporate fundamental security features such as 2FA. Learn how Total Access Control (TAC) can keep users more secure in this WFH world.

  • 7 Steps to SSO + MFA to On-Prem Apps

    Sponsored by: Okta

    Learn how to use Okta Access Gateway to control access to Hybrid IT and on-prem web applications, all without changing how your on-prem web apps work today.

  • Coronavirus: How Ready Are You for Remote Access?

    Sponsored by: PortSys

    Coronavirus is already demonstrating the power it can have to upset the interconnectedness of our business world. With the number of Coronavirus victims worldwide rapidly growing, many businesses will need to support employees who work from home. In this blog post, learn how your organization can take a secure approach to remote access.

  • Remove Standing Privileges Through a Just-in-Time PAM Approach

    Sponsored by: Centrify Corporation

    Privileged access carries significant risk, and even with PAM tools in place, the residual risk of users with standing privileges remains high. Security and risk management leaders must implement a zero standing privileges strategy through a just-in-time model. Download this report to learn how effective PAM requires enforcing least privilege.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Apcela

    Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.

  • A Framework for Cybersecurity and Compliance

    Sponsored by: OneNeck IT

    In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.

  • Pogo Paradox: Is Your Infrastructure Your Worst Enemy?

    Sponsored by: PortSys

    In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.

  • All Access Is Not Created Equal

    Sponsored by: PortSys

    "Context of Access" involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more. Discover why – to securely allow for new business innovation – organizations must understand Context of Access and have the technology to support it.

  • The Superpower of “Yes! But…”

    Sponsored by: PortSys

    There was a time not so long ago when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO! In this blog post, learn how and why security’s superpower of “NO!” turned into “Yes! But…”

  • Identity Is Not Security – Context Is King

    Sponsored by: PortSys

    Identity is still important to security, but identity alone is NOT security. By binding user credentials with security policies based on the multiple factors within context of access, organizations today can significantly strengthen the protection of their enterprise resources, and ultimately, their bottom line. Read this article to learn more.

  • Improving Lives Around the World through Easier Access to Knowledge

    Sponsored by: PortSys

    Learn how Research4Life was able to use PortSys Total Access Control to manage access across all programs and make the lives of end users around the world easier.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.