ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Software Research

  • The Future of Digital IAM

    Sponsored by: WSO2, Inc.

    If you're currently evaluating an Identity solution or exploring IAM, this webinar is for you. Download now to learn about the future of IAM and its forecasted trends.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: comForte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • Scaling Identity Management to Ensure Customer Loyalty Program Success

    Sponsored by: Akamai Technologies

    In this white paper, find 4 real-world case studies, where leading enterprises across the globe are deploying Akamai Identity Cloud to grow and transform their customer loyalty programs and other membership initiatives.

  • Hitachi ID Privileged Access Manager

    Sponsored by: Hitachi ID

    In this product overview, learn about the Hitachi ID Privileged Access Manager and how it can secure access to high risk accounts and groups, replace static, shared passwords with periodically changing random values, and much more.

  • Hitachi ID Identity & Access Management Suite

    Sponsored by: Hitachi ID

    The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    With Hitachi Identity Manager, organizations can move access changes out of IT to a mix of automated, HR-driven processes and request/approval workflows driven by business users. Download this solution brief to learn more about the benefits and capabilities of Identity Manager today.

  • The Evolution and Application of Identity Proofing

    Sponsored by: Evident

    Technology advancements have changed the landscape of identity proofing, challenging organizations to digitally verify that an individual is who they say they are online. But many businesses are resultant to implement identity proofing. In this white paper, learn why identity proofing is key to avoid risks associated with identity theft.

  • The Sharing Economy - The 7 Challenges of Online Identity Verification

    Sponsored by: Evident

    The absence of a standardized, fully reliable method of verifying the identity of participants and equipping them to prove the authenticity of their credentials could pose a real challenge to the success of sharing economy participants. In this white paper, examine 7 major hurdles to effective and consistent online identity verification.

  • Advanced Authentication Technologies for Detecting Real-time Threats to Banks

    Sponsored by: HID Global

    Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.

  • A Holistic Approach To Identity And Authentication

    Sponsored by: HID Global

    As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.

  • Supporting Business Agility in a Connected World

    Sponsored by: HID Global

    In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.

  • HID ActivOne User Friendly Strong Authentication

    Sponsored by: HID Global

    As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.

  • Webinar: What's New in iOS 12 Security

    Sponsored by: Data Theorem

    This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID Global

    To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.

  • The Convergence Of Physical And Logical Access: What It Really Means For An Organization's Security

    Sponsored by: HID Global

    For many security professionals, recent high-profile data breaches have shifted attention to external cyberthreats. In this white paper, learn how by addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency.

  • Case Study: Columbia County Sheriff

    Sponsored by: HID Global

    The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.

  • Evaluating Identity Verification Solutions

    Sponsored by: Onfido

    When evaluating an Identify and Access Management system, there are many criteria to look out for. Download this interactive checklist to help you.

  • The great IAM - time to modernise?

    Sponsored by: ComputerWeekly.com

    In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?

  • 5 Ways Fraudsters Fake Your ID

    Sponsored by: Onfido

    In this webinar, PYMNTS CEO Karen Webster and Kevin Trilli, Chief Product Officer at Onfido, discuss the current trends in fraud techniques, and reveal how risk and fraud managers can utilize new technologies to catch them. Watch now to learn the most common identity document fraud techniques and how to spot them.

  • Digital Transformation in Financial Services

    Sponsored by: Onfido

    It's obvious that traditional ways of proving our identities are no longer secure. So what are financial institutions doing about it? Tune into this webinar to learn about emerging technologies like AI, machine learning and biometrics and how they are changing the face of finance.

  • You Can Get IAM Right

    Sponsored by: One Identity

    In this e-book created exclusively for the RSA Conference, discover the most pressing IAM issues faced by virtually every organization and actionable, affordable and sustainable approaches to the IAM challenges you face.

  • The 10 Universal Truths of Identity and Access Management

    Sponsored by: One Identity

    IAM is an ever-moving target that has become a large and integral part of IT operations. In this white paper, discover 10 universal truths of IAM and how you can evaluate your need, implement a solid IAM solution and optimize its usage.

  • Building Networks with Security at Their Core

    Sponsored by: 128 Technology

    Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.

  • A Guide To Fraud In The Real World

    Sponsored by: Splunk Services UK Ltd

    Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.

  • 5 Identity Pitfalls to Avoid

    Sponsored by: Onfido

    Identity theft accounts for half of all reported fraud in the UK. And if you fail to catch that fraud, the cost to your business – both reputational and financial – can be catastrophic. Do you know the 5 most common identity pitfalls that businesses fall afoul of – and crucially, how to avoid them?

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.