ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Transform the Customer Experience with a Modern Customer IAM Solution

    Sponsored by: Okta

    Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.

  • Managing Customer & Partner Identities

    Sponsored by: Okta

    As a business, the last thing you want to do is make it difficult for users to log in by challenging them with cumbersome authentication processes. IT leaders are transitioning from on-prem identity management solutions to cloud-based identity as a service (IDaaS). Read this white paper to uncover the key functions and benefits of IDaaS.

  • Preventing PeopleSoft Breaches

    Sponsored by: Appsian

    Due to the ever-evolving threat landscape, Organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.

  • 14 Zero Trust eXtended (ZTX) Ecosystem Providers

    Sponsored by: Okta

    Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.

  • BeyondCorp for the Enterprise

    Sponsored by: Banyan Security

    Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.

  • Getting Started with Zero Trust: Never Trust, Always Verify

    Sponsored by: Okta

    As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.

  • Okta Identity Management for Portals Built on Salesforce.com

    Sponsored by: Okta

    Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.

  • Decoding Customer IAM (CIAM) vs. IAM

    Sponsored by: Okta

    While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.

  • Top 5 Reasons to Automate Identity Lifecycle

    Sponsored by: Okta

    As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.

  • Passwordless Datasheet

    Sponsored by: Okta

    Identity-driven attacks are increasingly common methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud. Read this data sheet to discover how passwordless authentication can help keep attackers at bay without locking out good users.

  • Are Bots Killing Your Business Intelligence?

    Sponsored by: F5 Networks

    While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.

  • 7 Considerations for Implementing Zero Trust

    Sponsored by: Banyan Security

    Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.

  • Zero Trust Remote Access Platform

    Sponsored by: Banyan Security

    Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.

  • The Next Wave of Bot-Driven Brute Force Attacks

    Sponsored by: F5 Networks

    With most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.

  • Okta + Experian: Identity Proofing Your Enterprise

    Sponsored by: Okta

    In this data sheet, find out how Okta and Experian work together to offer enterprises multiple layers of security and proofing to verify a user’s identity, and ensure they are entitled to access the information they’re trying to access.

  • Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects

    Sponsored by: Banyan Security

    Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.

  • Newcomer Banyan Tackles Zero Trust with a Mesh-Based Approach to Multi-Cloud Security

    Sponsored by: Banyan Security

    In this 451 Research report, learn about Banyan’s new security offering that focuses on the authorization layer of a zero-trust platform, or what it calls a ‘zero trust continuous authorization framework.’

  • The Evolution of Zero Trust

    Sponsored by: Banyan Security

    As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.

  • Get Your App Ready for the Global B2B Market

    Sponsored by: Okta

    To foster a healthy relationship with enterprise partners and customers, you need to allow those users to use their existing enterprise identities to access your applications or shared resources. In this white paper, learn about 4 ways to integrate your enterprise applications and internal systems with your partners and customers’ identities.

  • Accelerating the Journey to Passwordless Authentication

    Sponsored by: IBM

    A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.

  • Getting Started with Zero Trust Never trust, Always Verify

    Sponsored by: Okta

    There is no silver bullet when it comes to achieving a zero-trust security architecture, but identity and access management is the core technology that organizations can start with on their Zero Trust journeys. Read on to learn the benefits of Zero Trust and what a framework looks like today.

  • Consumer Data Right: Open Banking

    Sponsored by: Ping Identity Corporation

    With consumers growing increasingly reliant on digital services and interfaces, the financial industry is evolving to meet these expectations through open banking interfaces. In this solution brief, explore the Ping Identity Platform, designed to meet Australia’s Open Banking requirements while still providing a seamless user experience.

  • IBM Identity and Access Management Services: Costs and Benefits

    Sponsored by: IBM

    Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.

  • Access Management Vendors: Analyst Report

    Sponsored by: IBM

    SaaS-delivered access management has become the norm, and vendors are including API capabilities for integrating authentication and authorization into applications and services. Gartner recently published a Magic Quadrant report for Access Management, which evaluates and compares various AM providers. Read on to learn more.

  • Automating Identity & Access Management

    Sponsored by: Hitachi ID

    Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.