ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Software Research

  • Identity Insider: Take on the Future

    Sponsored by: SailPoint Technologies

    With security such an important topic for literally every person around the world, it's time for people to gain a better understanding of innovations coming to the industry. In the 3rd annual Identity Insider, explore a number of articles which discuss how identity and access management will be affected by innovation in 2020.

  • Protecting Your Organization from Password Breaches

    Sponsored by: OneLogin

    With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.

  • CyberArk Global Advanced Threat Landscape Report 2019

    Sponsored by: CyberArk Software, Inc

    In order to gain a better understanding of business leaders' engagement with cybersecurity as global organizations transition to true digital businesses, CyberArk conducted a survey. The survey also focuses on the practice of privileged access security. Download the report to explore key findings.

  • Identity Governance: The Great Enabler

    Sponsored by: SailPoint Technologies

    To understand how leading organizations are governing the digital identities of their employees and enhancing security in an age of rapid digital transformation, Forbes insights in association with SailPoint surveyed 200 senior technology executives at mid-market corporations. Download this report to explore highlights.

  • PeopleSoft Single Sign-On

    Sponsored by: Appsian

    Explore how Appsian's Peoplesoft SSO Connecter can help your organization ensure its PeopleSoft applications work seamlessly within your enterprise environment. Learn about the challenges of off-the-shelf SSO software, and discover how Appsian's PeopleSoft SSO Connecter can help your organization improve security, boost productivity, and more.

  • Two-Factor Authentication Evaluation Guide

    Sponsored by: Ignition Technology Ltd

    In the Two-Factor Authentication Evaluation Guide, get an overview of the hidden costs of a two-factor solution and how to determine your ROI, a comprehensive set of criteria to customize your evaluation to your organization's needs, a list of resources needed to deploy, provision and integrate your solution, and more.

  • Leveraging Analytics to Combat Digital Fraud in Financial Organizations

    Sponsored by: SAS

    Delve into this white paper to discuss the opportunities, challenges, and solutions around financial fraud in the digital age.

  • The Journey to IAM Success

    Sponsored by: One Identity

    In this e-book, read about the IAM journey that 6 organizations have made - and how One Identity helped them reach their goals.

  • The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications

    Sponsored by: Cyber-Ark Software

    The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.

  • Why Biometric Verification is Key to Proving Digital Identity

    Sponsored by: Onfido

    Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.

  • Secure Telecommunications in the Age of 5G and IoT

    Sponsored by: Cyber-Ark Software

    Download this white paper to learn why privileged access management is key to protecting telecom's critical infrastructure.

  • Privacy: Data Protection and Identity Management

    Sponsored by: Micro Focus

    To help enterprises meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. In this webcast, Nathan Turajski, Director of Product Marketing at Micro Focus provides an overview of their Data Protection and Identity Management solution.

  • How the Global Law Firm Reduced Help Desk Tickets With Duo's MFA

    Sponsored by: Ignition Technology Ltd

    Withers Worldwide is a mid-sized law firm, and was experiencing inconsistencies with how employees logged into cloud and on-premises applications. Find out how they used Duo Access to streamline authentication with MFA and keep sensitive data safe in this case study.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • The Future of Digital IAM

    Sponsored by: WSO2, Inc.

    If you're currently evaluating an Identity solution or exploring IAM, this webinar is for you. Download now to learn about the future of IAM and its forecasted trends.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: Comforte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • Hitachi ID Privileged Access Manager

    Sponsored by: Hitachi ID

    In this product overview, learn about the Hitachi ID Privileged Access Manager and how it can secure access to high risk accounts and groups, replace static, shared passwords with periodically changing random values, and much more.

  • Hitachi ID Identity & Access Management Suite

    Sponsored by: Hitachi ID

    The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    With Hitachi Identity Manager, organizations can move access changes out of IT to a mix of automated, HR-driven processes and request/approval workflows driven by business users. Download this solution brief to learn more about the benefits and capabilities of Identity Manager today.

  • The Evolution and Application of Identity Proofing

    Sponsored by: Evident

    Technology advancements have changed the landscape of identity proofing, challenging organizations to digitally verify that an individual is who they say they are online. But many businesses are resultant to implement identity proofing. In this white paper, learn why identity proofing is key to avoid risks associated with identity theft.

  • The Sharing Economy - The 7 Challenges of Online Identity Verification

    Sponsored by: Evident

    The absence of a standardized, fully reliable method of verifying the identity of participants and equipping them to prove the authenticity of their credentials could pose a real challenge to the success of sharing economy participants. In this white paper, examine 7 major hurdles to effective and consistent online identity verification.

  • Advanced Authentication Technologies for Detecting Real-time Threats to Banks

    Sponsored by: HID Global

    Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.

  • A Holistic Approach To Identity And Authentication

    Sponsored by: HID Global

    As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.

  • Supporting Business Agility in a Connected World

    Sponsored by: HID Global

    In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.

  • HID ActivOne User Friendly Strong Authentication

    Sponsored by: HID Global

    As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.