ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identification Systems Research

  • Peer Insights: Identity Governance and Administration

    Sponsored by: SailPoint Technologies

    This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.

  • SailPoint Identity is Security

    Sponsored by: SailPoint Technologies

    If you can’t see who has access, know what your users are doing, automatically modify or terminate access, or flag suspicious activity, your organization’s security had identity-shaped holes it. In this short video, learn how to secure your organization SailPoint Identity.

  • Onfido & Finiata Case Study

    Sponsored by: Onfido

    In this case study, follow the journey of Finiata, a German company who helps small businesses with cashflow issues by verifying and de-risking them, as they partner with Onfido to incorporate automation into their verification processes. Read on to explore Finiata’s challenges, what led to their partnership with Onfido, and the outcomes.

  • How to Detect The 7 Types of Document and Identity Fraud

    Sponsored by: Onfido

    Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.

  • Creating Digital Trust: Anchoring Remote Users to Real Identities

    Sponsored by: Onfido

    As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.

  • Role-based identity management: SailPoint short video

    Sponsored by: SailPoint Technologies

    In this short video, learn how you can easily manage roles at your organization with IdentityNow’s role-based identity management function.

  • IdentityNow Short Video: Separation of Duties

    Sponsored by: SailPoint Technologies

    Separation of Duties (SOD) is an internal control mechanism designed to prevent error and fraud by ensuring at least two individuals are responsible for separate parts of any high risk or sensitive tasks. SOD policies for identity systems, however, can be difficult and complex to manage. Find out how IdentityNow makes it easier.

  • Onfido & Sidehide Case Study

    Sponsored by: Onfido

    Sidehide is enabling “one-click hotels”, offering users a seamless booking and check-in experience. But in order to build this, Sidehide identified three challenges to overcome: local regulations, fraud, and user experience. In this case study, find out how Onfido allowed them to combat these challenges with trusted identity.

  • The Future of Authentication: A Catalyst for Change

    Sponsored by: Onfido

    Biometrics offer an additional later of security to identify customers but come with a host of privacy and ethical concerns that must be addressed. In this security newsletter, “The Future of Authentication,” experts debate the pros and cons, debunk common myths, and get into the ethics of biometrics. Open the PDF to get started.

  • Okta Inner Circle Conversations: How Selfies are Helping Secure the Insurance Sector

    Sponsored by: Okta

    In this webinar, uncover how Okta partners with Jumio to use facial recognition selfie-based authentication to replace knowledge-based authentication.

  • Auth0’s Approach to Information Security Identity in the Real World

    Sponsored by: Auth0

    Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.

  • Mistakes to Love: A Survey of Identity Mistakes

    Sponsored by: Auth0

    For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.

  • 10 Ways to Secure and Accelerate a Modern Workforce

    Sponsored by: Cloudflare

    As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.

  • Passwordless Authentication Solutions by Thales

    Sponsored by: Thales

    Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.

  • Identity Proofing

    Sponsored by: Entrust, Inc.

    Today’s customers and end users demand fast, secure digital interactions from the organizations they do business with. This white paper highlights the key features and capabilities of Entrust Datacard’s ID Proofing offering, designed to provide fast, accurate and fully digital identity proofing. Read on to learn more.

  • Identity Proofing to Accelerate Customer Acquisition and Onboarding

    Sponsored by: Entrust, Inc.

    As the mobile banking industry grows more competitive, each new application user (or non-user) plays a critical role in the bank’s success. This solution brief takes a closer look at the key features and capabilities of Entrust Datacard’s Identity proofing solution, designed to improve security and customer experience.

  • Digital Identity Proofing How to Verify Identities Remotely and Securely

    Sponsored by: Entrust, Inc.

    In response to the recent surge of remote workers and online shoppers, organizations are having to take measures to ensure their environments are fit to secure the growing volume of users while maintaining experience. Read this white paper to learn more about an effective and scalable approach – identity proofing.

  • The New Identity Frontiers

    Sponsored by: SailPoint Technologies

    For all organizations to effectively and completely secure their digital identities, identity governance needs to evolve. Download this brief to learn about the new identity frontiers.

  • Hitachi ID Group Manager

    Sponsored by: Hitachi ID

    Hitachi ID Group Manager helps make the administration of security groups and mail distribution lists faster, cheaper and more secure. To learn more, download this product brief and discover all of the ways Hitachi ID Group Manager can benefit your organization today.

  • Automation First: A Practical Approach to IAM

    Sponsored by: Hitachi ID

    This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.

  • Hitachi ID Identity & Access Management Suite

    Sponsored by: Hitachi ID

    The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    With Hitachi Identity Manager, organizations can move access changes out of IT to a mix of automated, HR-driven processes and request/approval workflows driven by business users. Download this solution brief to learn more about the benefits and capabilities of Identity Manager today.

  • Ansarada Sees Significant Resource Savings With Auth0

    Sponsored by: Auth0

    Since authentication and user management is critical to Ansarada's platform and critical to their security posture, they looked to Auth0 to help them get ahead of their challenges with creating a central identity service. Download this case study to learn more.

  • How to Combat Fraud in 3 Easy Steps

    Sponsored by: Onfido

    There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.

  • Identity and Access Management Tools to Look Out For

    Sponsored by: Okta

    Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.