ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identification Systems Research

  • Synthetic Identity - A Rapidly Growing Global Issue

    Sponsored by: RSA Conference

    The RSA Conference eFraud Global Forum brings together anti-fraud leaders from across the world for a candid conversation about e-fraud challenges and solutions. In this webinar, hear from experts in the UK and US as they share the greatest e-fraud challenges they face—including synthetic identity—and how they fight back in this ongoing battle.

  • Hitachi ID Group Manager

    Sponsored by: Hitachi ID

    Hitachi ID Group Manager helps make the administration of security groups and mail distribution lists faster, cheaper and more secure. To learn more, download this product brief and discover all of the ways Hitachi ID Group Manager can benefit your organization today.

  • Automation First: A Practical Approach to IAM

    Sponsored by: Hitachi ID

    This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.

  • Hitachi ID Identity & Access Management Suite

    Sponsored by: Hitachi ID

    The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    With Hitachi Identity Manager, organizations can move access changes out of IT to a mix of automated, HR-driven processes and request/approval workflows driven by business users. Download this solution brief to learn more about the benefits and capabilities of Identity Manager today.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID Global

    To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.

  • Case Study: Columbia County Sheriff

    Sponsored by: HID Global

    The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.

  • Authentication Devices

    Sponsored by: HID Global

    Today it's critical to move beyond passwords to more secure authentication methods to ensure the person asking for access is who they say they are. In this product selection guide, take a look at different types of authentication tokens to see which one is right for your organization.

  • Computer Weekly – 10 July 2018: Tackling the digital identity problem

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.

  • Digital identities and the open business

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.

  • Best Practices for Managing and Understanding Mobile Authentication

    Sponsored by: SearchSecurity.com

    In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.

  • Identity and Access Management Tools to Look Out For

    Sponsored by: Okta

    Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA Conference

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • Crafting an Identity-Based Security Strategy for Cloud

    Sponsored by: Hewlett Packard Enterprise

    IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.

  • How to Craft SSO and IAM Strategies on the Cloud

    Sponsored by: OneLogin

    Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: SearchSecurity.com

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise

    Sponsored by: IBM

    Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.

  • IDC 2014 WW MarketScape Report for Federated Identity Management and SSO

    Sponsored by: IBM

    Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.

  • Managing User Identities and Access in the Cloud

    Sponsored by: IBM

    Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.

  • A Guide to Password Use in WebSphere Application Server

    Sponsored by: Global Knowledge

    Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

  • IBM Security Priviledged Identity Management

    Sponsored by: IBM

    This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.

  • Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication

    Sponsored by: Celestix Networks

    This guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.

  • Using a Risk-Based Approach to Address a Changing Threat Landscape

    Sponsored by: RSA Conference

    In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.