ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identification Systems Research

  • The IT Director's Guide to Multi-Factor Authentication

    Sponsored by: Ping Identity Corporation

    Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.

  • Why Biometric Verification is Key to Proving Digital Identity

    Sponsored by: Onfido

    Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.

  • Hitachi ID Group Manager

    Sponsored by: Hitachi ID

    Hitachi ID Group Manager helps make the administration of security groups and mail distribution lists faster, cheaper and more secure. To learn more, download this product brief and discover all of the ways Hitachi ID Group Manager can benefit your organization today.

  • Automation First: A Practical Approach to IAM

    Sponsored by: Hitachi ID

    This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.

  • Hitachi ID Identity & Access Management Suite

    Sponsored by: Hitachi ID

    The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    With Hitachi Identity Manager, organizations can move access changes out of IT to a mix of automated, HR-driven processes and request/approval workflows driven by business users. Download this solution brief to learn more about the benefits and capabilities of Identity Manager today.

  • Ansarada Sees Significant Resource Savings With Auth0

    Sponsored by: Auth0

    Since authentication and user management is critical to Ansarada's platform and critical to their security posture, they looked to Auth0 to help them get ahead of their challenges with creating a central identity service. Download this case study to learn more.

  • Ask the Biometrics Expert: Q&A on the Current State of Biometrics

    Sponsored by: Onfido

    Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology? Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to find out.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID Global

    To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.

  • Case Study: Columbia County Sheriff

    Sponsored by: HID Global

    The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.

  • Authentication Devices

    Sponsored by: HID Global

    Today it's critical to move beyond passwords to more secure authentication methods to ensure the person asking for access is who they say they are. In this product selection guide, take a look at different types of authentication tokens to see which one is right for your organization.

  • The Future of Digital Onboarding

    Sponsored by: Onfido

    Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Tune into this webinar for past and emerging identity trends and how your organization can detect potential fraud.

  • Providing the Right Privileged Access to Get the Job Done

    Sponsored by: One Identity

    In this case study, learn how Cavium, a processor manufacturer used One Identity Safeguard and Active Roles Simplify and secure access to privileged credentials, Automate password changes to reduce exposure for passwords being stolen or misused, and much more.

  • The Breach Prevention Playbook

    Sponsored by: One Identity

    Today's breaches leave us knowing that IAM and password security is more important than ever before. In this e-book, discover IAM practices and technologies that can bolster your chances of not only surviving the inevitable breach but enabling your organization to emerge with minimal damage.

  • Detect and Prevent Identity Theft

    Sponsored by: SAS

    In this white paper, discover how advanced analytics can uncover the fast-growing incidence of synthetic identities today.

  • You Can Get IAM Right

    Sponsored by: One Identity

    In this book created exclusively for the RSA Conference, delve into the most pressing IAM issues faced by virtually every organization and sustainable approaches to the IAM challenges you face today.

  • Building Networks with Security at Their Core

    Sponsored by: 128 Technology

    Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.

  • A Guide To Fraud In The Real World

    Sponsored by: Splunk

    Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.

  • A Guide to Digital Identity Verification: The Technology and Trends

    Sponsored by: Onfido

    An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.

  • Analyst Identity and Access Management Maturity Assessment

    Sponsored by: OneLogin

    To help security leaders, Forrester developed an IAM maturity assessment tool to help identify gaps in their current IAM strategy and practices and improve their overall security posture. Read on to see where your organization stacks up.

  • Is Biometrics the Future of Security?

    Sponsored by: One Identity

    Biometrics is the automated recognition of individuals based on their behavioral and biological characteristics. Learn why it's important to your business's security and why passwords may not be unique enough anymore.

  • Computer Weekly – 10 July 2018: Tackling the digital identity problem

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.

  • Identity and Access Management Tools to Look Out For

    Sponsored by: Okta

    Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • Crafting an Identity-Based Security Strategy for Cloud

    Sponsored by: Hewlett Packard Enterprise

    IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.