ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Appian for Insurance: Underwriting Authority Management

    Sponsored by: Appian

    For insurance companies, ensuring that underwriting authority information is correct, updated, and trusted is important to avoid financial risks. This white paper delves into advanced records management services, discussing how low-code platforms can help in the struggle to keep underwriting authority simple and secure. Read the paper here.

  • A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems

    Sponsored by: ShieldX

    Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.

  • Zero Trust Access Helps UK County Improve Productivity and Access Control

    Sponsored by: PortSys

    The initiation of GDPR caused widespread change in the way organizations handled consumer data across the EU. In this case study, follow the Essex County Council, keepers of personal data for their residents, through their post-GDPR journey towards zero-trust access control to enable their employees to collaborate in a secure environment.

  • A CISO’s Guide to Micro-Segmentation

    Sponsored by: ShieldX

    Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. Download this guide for a comprehensive checklist that can help take the pain out of micro-segmentation adoption.

  • Security Controls for Effective Micro-Segmentation

    Sponsored by: ShieldX

    With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.

  • Mobile Verify

    Sponsored by: Mitek Systems, Inc.

    Through advanced machine-learning algorithms, identity verification enables businesses to authenticate their digital users’, empowering them to enhance customer experience and data security. Read this data sheet to explore the science behind Mitek’s Mobile Verify digital identity verification tool and how it works.

  • Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky

    Sponsored by: Tehama

    Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.

  • Securing the workplace of the future

    Sponsored by: Tehama

    A stolen or compromised identity is at the heart of many of the major data breaches you read about in the news. With virtual access becoming the norm, ensuring protection for a borderless workplace is critical to maintaining a secure environment. In this white paper, explore 3 key best practices for securing your digital workforce.

  • Cisco Umbrella & Duo Security: Protect users and secure access to applications

    Sponsored by: Cisco Umbrella

    As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.

  • Cybersecurity Insights Report Ninth Edition

    Sponsored by: AT&T Cybersecurity

    5G is more than just an increase in speed; its rollout is expected to change the way organizations approach network and technology security. A recent study was conducted to uncover the potential impacts of 5G and the preparedness of enterprises. Read on to uncover the key insights from the research.

  • What to Look for in a Zero Trust Solution in 2020

    Sponsored by: PortSys

    With massive breaches regularly making headlines, it’s clear that traditional security is ineffective at mitigating today’s evolving attacks. The zero-trust approach to access control enables organizations to mitigate risk in the cloud era, taking belief out of the equation and substituting it with assurance. Read on to learn more.

  • Zero Trust Access

    Sponsored by: PortSys

    Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.

  • What to Look for in a Zero Trust Solution in 2020

    Sponsored by: PortSys

    The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.

  • Transform the Customer Experience with a Modern Customer IAM Solution

    Sponsored by: Okta

    Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.

  • Managing Customer & Partner Identities

    Sponsored by: Okta

    As a business, the last thing you want to do is make it difficult for users to log in by challenging them with cumbersome authentication processes. IT leaders are transitioning from on-prem identity management solutions to cloud-based identity as a service (IDaaS). Read this white paper to uncover the key functions and benefits of IDaaS.

  • Preventing PeopleSoft Breaches

    Sponsored by: Appsian

    Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.

  • 14 Zero Trust eXtended (ZTX) Ecosystem Providers

    Sponsored by: Okta

    Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.

  • BeyondCorp for the Enterprise

    Sponsored by: Banyan Security

    Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.

  • Getting Started with Zero Trust: Never Trust, Always Verify

    Sponsored by: Okta

    As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.

  • Okta Identity Management for Portals Built on Salesforce.com

    Sponsored by: Okta

    Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.

  • Decoding Customer IAM (CIAM) vs. IAM

    Sponsored by: Okta

    While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.

  • Top 5 Reasons to Automate Identity Lifecycle

    Sponsored by: Okta

    As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.

  • Passwordless Datasheet

    Sponsored by: Okta

    Identity-driven attacks are increasingly common methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud. Read this data sheet to discover how passwordless authentication can help keep attackers at bay without locking out good users.

  • 7 Considerations for Implementing Zero Trust

    Sponsored by: Banyan Security

    Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.

  • Zero Trust Remote Access Platform

    Sponsored by: Banyan Security

    Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.