ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identification Systems Research

  • Simplify and Secure all Privileged Access with Agentless MFA

    Sponsored by: Silverfort

    With all privileged accounts and assets centrally managed by the CyberArk Privileged Access Security solution, it's critical to ensure that only authorized users can access and utilize them. Download this solution brief to learn about the benefits of Silverfort and CyberArk integration today.

  • Hitachi ID Group Manager

    Sponsored by: Hitachi ID

    Hitachi ID Group Manager helps make the administration of security groups and mail distribution lists faster, cheaper and more secure. To learn more, download this product brief and discover all of the ways Hitachi ID Group Manager can benefit your organization today.

  • Automation First: A Practical Approach to IAM

    Sponsored by: Hitachi ID

    This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.

  • Hitachi ID Identity & Access Management Suite

    Sponsored by: Hitachi ID

    The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    With Hitachi Identity Manager, organizations can move access changes out of IT to a mix of automated, HR-driven processes and request/approval workflows driven by business users. Download this solution brief to learn more about the benefits and capabilities of Identity Manager today.

  • Ansarada Sees Significant Resource Savings With Auth0

    Sponsored by: Auth0

    Since authentication and user management is critical to Ansarada's platform and critical to their security posture, they looked to Auth0 to help them get ahead of their challenges with creating a central identity service. Download this case study to learn more.

  • Ask the Biometrics Expert: Q&A on the Current State of Biometrics

    Sponsored by: Onfido

    Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology? Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to find out.

  • Best Practices for Privileged Access Management on Elastic Infrastructure

    Sponsored by: Gravitational

    Implementing a system of Privileged Access Management that meets today's requirements for scalability, while ensuring regulatory compliance and enforcing security can be a daunting challenge. Download this guide for help today.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID Global

    To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.

  • Case Study: Columbia County Sheriff

    Sponsored by: HID Global

    The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.

  • Evaluating Identity Verification Solutions

    Sponsored by: Onfido

    When evaluating an Identify and Access Management system, there are many criteria to look out for. Download this interactive checklist to help you.

  • Authentication Devices

    Sponsored by: HID Global

    Today it's critical to move beyond passwords to more secure authentication methods to ensure the person asking for access is who they say they are. In this product selection guide, take a look at different types of authentication tokens to see which one is right for your organization.

  • The Future of Digital Onboarding

    Sponsored by: Onfido

    Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Tune into this webinar for past and emerging identity trends and how your organization can detect potential fraud.

  • Financial Services, Fraud and the Future of Digital Onboarding

    Sponsored by: Onfido

    Today, identifiers and regulations such as Know Your Customer (KYC) are raising new challenges for smooth and secure onboarding. In this white paper, learn about identity verification best practices, such as biometrics, that can help your organization keep up with the changing landscape of identity theft and fraud.

  • 5 Ways Fraudsters Fake Your ID

    Sponsored by: Onfido

    In this webinar, PYMNTS CEO Karen Webster and Kevin Trilli, Chief Product Officer at Onfido, discuss the current trends in fraud techniques, and reveal how risk and fraud managers can utilize new technologies to catch them. Watch now to learn the most common identity document fraud techniques and how to spot them.

  • Digital Transformation in Financial Services

    Sponsored by: Onfido

    It's obvious that traditional ways of proving our identities are no longer secure. So what are financial institutions doing about it? Tune into this webinar to learn about emerging technologies like AI, machine learning and biometrics and how they are changing the face of finance.

  • Providing the Right Privileged Access to Get the Job Done

    Sponsored by: One Identity

    In this case study, learn how Cavium, a processor manufacturer used One Identity Safeguard and Active Roles Simplify and secure access to privileged credentials, Automate password changes to reduce exposure for passwords being stolen or misused, and much more.

  • You Can Get IAM Right

    Sponsored by: One Identity

    In this e-book created exclusively for the RSA Conference, discover the most pressing IAM issues faced by virtually every organization and actionable, affordable and sustainable approaches to the IAM challenges you face.

  • The Breach Prevention Playbook

    Sponsored by: One Identity

    Today's breaches leave us knowing that IAM and password security is more important than ever before. In this e-book, discover IAM practices and technologies that can bolster your chances of not only surviving the inevitable breach but enabling your organization to emerge with minimal damage.

  • Detect and Prevent Identity Theft

    Sponsored by: SAS

    In this white paper, discover how advanced analytics can uncover the fast-growing incidence of synthetic identities today.

  • You Can Get IAM Right

    Sponsored by: One Identity

    In this book created exclusively for the RSA Conference, delve into the most pressing IAM issues faced by virtually every organization and sustainable approaches to the IAM challenges you face today.

  • Building Networks with Security at Their Core

    Sponsored by: 128 Technology

    Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.

  • Biometrics: Learn the advantages and disadvantages

    Sponsored by: Onfido

    When used in conjunction with other authentication factors, like passwords or tokens, biometric authentication methods have the potential to improve security as well as the user experience. In this e-guide, learn about the advantages of biometrics.

  • A Guide To Fraud In The Real World

    Sponsored by: Splunk

    Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.

  • Identity and Access Management Tools to Look Out For

    Sponsored by: Okta

    Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.