Research Library

Powered by

Identity Management Software Research

  • Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment

    Sponsored by: WatchGuard Technologies, Inc.

    MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.

  • A Computer Weekly e-Guide to IAM

    Sponsored by:

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • Preventing identity theft in a data breach

    Sponsored by:

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • 6 Key Identity and Access Management Benefits

    Sponsored by: Beta Systems

    Identity and access management (IAM) gives organizations an enhanced ability to oversee their digital identities. In a remote and hybrid world, the benefits of IAM are more pronounced than ever. Read this guide to take in 6 of these key benefits, and learn why adopting IAM practices gives you a competitive advantage.

  • Grow Your BusinessWith the Power of GlobalSign

    Sponsored by: GlobalSign

    One of the challenges faced by digital organizations today is managing digital identities – eSignature compliance, email security and mobile device management all can be made simpler with a cohesive digital identity management platform. View this e-book to see how GlobalSign’s public key infrastructure (PKI) may be able to help.

  • Protecting On-Premises Microsoft Exchange Servers

    Sponsored by: TransientX, Inc

    On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.

  • Full Mainframe Protection for The Entire Security Lifecycle eBook

    Sponsored by: BROADCOM, Inc

    The more rules there are, the easier it is to fall foul of them, even if you don’t mean to. And as your business grows, there are always going to be new risks to think about. Identify, manage and minimize your exposure to risk. Watch this 8-minute video to discover Deloitte’s Integrated Risk Management, powered by ServiceNow.

  • The iboss cloud Zero Trust Network Access (Z TNA) Private Access Platform architecture

    Sponsored by: iBoss

    Organizations deploying and using legacy network security appliances to protect cloud connectivity and internet access are faced with the problem of the disappearing network perimeter. But zero trust network access can ensure fast, compliant and secure connections from anywhere. Download this white paper to explore zero trust in detail.

  • Hitachi ID Bravura Security Fabric

    Sponsored by: Hitachi ID

    Security teams are beginning to implement what are known as ‘fabrics’ in their stacks for a more across-the-board approach to security responsibilities. What benefits can implementing a fabric have when it comes to identity? Take a look at this data sheet to learn about Hitachi’s ID Bravura Security Fabric for digital identity management.

  • Hitachi ID Bravura Pass

    Sponsored by: Hitachi ID

    With login and password problems continuing to represent 30% of the call volume to a typical help desk, organizations need a way to help users help themselves. Hitachi ID Bravura Pass strives to simplify password management and easily control credentials on-premises and in the cloud. Access this data sheet to view product spec and features.

  • Hitachi ID Bravura Identity

    Sponsored by: Hitachi ID

    Managing digital identities in a remote context can be challenging. But modern technology has delivered a platform that can both manage and govern identities, groups and access to systems and applications, all from one comprehensive solution. Browse this data sheet to become informed on Hitachi ID Bravura Identity.

  • SIG - SASE in 15 minutes

    Sponsored by: Cisco Umbrella

    Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.

  • Enable & Secure Your Remote Workforce

    Sponsored by: BeyondTrust Corporation

    IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.

  • The Guide To Just-In-Time Privileged Access Management

    Sponsored by: BeyondTrust Corporation

    Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.

  • Computer Weekly Buyer's Guide: Identity and Access Management

    Sponsored by:

    When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring largecompanies, the implications of cloud and how to pick the right service for your firm.

  • Cover Your Bases: Best Practices for Protecting Remote Work

    Sponsored by: Okta

    You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.

  • Computer Weekly – 19 January 2021: The UK's struggle with digital schooling

    Sponsored by:

    In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.

  • Axis Keeps Cardenas Markets Well-Stocked & Well-Protected

    Sponsored by: Axis Security

    For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.

  • Overcoming the Legacy VPN Dilemma: Zero-Trust Access with Application Access Cloud

    Sponsored by: Axis Security

    Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access models enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.

  • IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution

    Sponsored by: Axis Security

    Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.

  • Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access

    Sponsored by: Axis Security

    VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.

  • On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access

    Sponsored by: Axis Security

    Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.

  • Enabling Partners With Simple, Private Application Access

    Sponsored by: Axis Security

    Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.

  • Axis Security Video 1: Application Access Cloud

    Sponsored by: Axis Security

    Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.

  • Blackberry Cyber Suite

    Sponsored by: BlackBerry

    In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences