ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • How to Maintain Control of Documents and Files Shared with Others

    Sponsored by: Citrix

    Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more.

  • Controlling and ManagingPrivileged Access

    Sponsored by: One Identity

    Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.

  • Identity and Access Management for the Real World: The Fundamentals

    Sponsored by: One Identity

    The world of IAM is one of constant change, deadlines, and harsh regulations. This e-book delves into the most pressing IAM issues faced by organizations and offers actionable, affordable and sustainable approaches to these challenges.

  • The 10 Universal Truths of Identity and Access Management

    Sponsored by: One Identity

    IAM is an ever-moving target that has become a large and integral part of IT operations. Explore this white paper to uncover 10 universal truths of IAM to help you evaluate your need for an IAM approach as well as how to implement and optimize its usage.

  • A Comprehensive Defense in the Battle to Reduce Risk & Enhance Security

    Sponsored by: One Identity

    Is your IAM approach prepared to secure your enterprise and enable business? This white paper explores how identity analytics can guide your IAM approach in the battle to reduce risk and enhance security.

  • The Evolution of RBAC Models to Next-Generation ABAC

    Sponsored by: Axiomatics

    In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.

  • Getting Started With Attribute Based Access Control

    Sponsored by: Axiomatics

    How are you protecting access to your most critical assets? Explore this white paper to gain insight into attribute based access control (ABAC) and uncover 3 major steps to deploying an effective program.

  • Why PCI DSS Compliance is Impossible without Privileged Management

    Sponsored by: One Identity

    For many organizations, compliance with data security standards is very difficult. This white paper dives into IT security compliance for PCI DSS and offers strategies to make your compliance approach tangible and secure.

  • IAM for the Real World: Access Management

    Sponsored by: One Identity

    A large government agency with 250,000 users across its Windows and Unix/Linux environments found that each individual IT-assisted access management activity cost more than $300. Annually, this cost is staggering. Access this white paper to learn how to advance your access management approach with real-world examples from organizations.

  • Future-Proof Your Tactical IAM Projects

    Sponsored by: One Identity

    This e-book provides insight into how to overcome barriers to identity and access management (IAM) success by future-proofing your tactical IAM projects.

  • 2018 Gambling Security Report

    Sponsored by: iovation, Inc.

    2017 marked the first year in which iOS had the largest share of gambling transactions. With the online gaming market booming, cybercriminals are finding ways to target personal data. Utilize this guide to learn how to prepare for unconventional attacks, prevent fraud, and adhere to regulations within the online gaming industry.

  • Strategies for Successfully Managing Privileged Accounts

    Sponsored by: One Identity

    One of the most important aspects of an IAM program is the securing, management and governance of privileged accounts. This resource uncovers strategies for successfully managing privileged accounts in order to improve your IAM approach.

  • Top 5 Ways to Relieve the Pain of Managing Hybrid AD Environments

    Sponsored by: One Identity

    According to One Identity, nearly 90% of organizations worldwide are using Active Directory (AD) for on-premises resources. This e-book addresses 5 challenges that organizations must overcome as they navigate the transition to a hybrid AD implementation.

  • Access Control is Easy

    Sponsored by: One Identity

    Effective access control is a matter of well-managed groups. This resource uncovers how to implement and manage Active Directory (AD) groups and dives into why they are at the center of the access control and governance universe.

  • IAM for the Real World: Privileged Account Management

    Sponsored by: One Identity

    The world of IAM is one of constant change, shrinking deadlines and harsh regulations. This e-book dives into the most pressing IAM issues faced by organizations and offers actionable, affordable and sustainable approaches to combatting these challenges.

  • The Right Way to Prove Identity and Establish Trust

    Sponsored by: One Identity

    Passwords provide assurance of identity, but they can be easily compromised. This resource reveals a strategy to proving the identity of individuals in a transaction or exchange of personal information.

  • Top 5 Questions to Ask Before Purchasing a Two-Factor Authentication Solution

    Sponsored by: One Identity

    With the multitude of two-factor authentication programs available in the market today, how do you know which one is right for your organization? This resource offers 5 questions to ask before selecting and implementing a two-factor authentication strategy.

  • Selecting the Right IDaaS for Zero Trust Security

    Sponsored by: Centrify Corporation

    With the perimeter of the network diminishing, organizations must shift identity to the center of their threat detection ecosystem. This webcast dives into the Zero Trust Security model and offers strategies for improving IAM and selecting the right IDaaS.

  • The City of Frankfurt Enables Work from Home with Two-Factor Authentication

    Sponsored by: One Identity

    Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.

  • 10 Steps to Cleaning up Active Directory User Accounts

    Sponsored by: One Identity

    Active Directory (AD) is the foundation of IAM at most organizations and as a result, is one of the most crucial technologies on the network. This resource offers 10 steps to remediate user account problems in AD and to prevent them from occurring in the future.

  • 5 Steps to Mitigate the Risks of Privileged Accounts

    Sponsored by: One Identity

    Granting privileged access increases the risk of a security breach, no matter what industry your organization represents. This resource provides strategies for preventing security breaches and offers 5 steps to mitigate the risks of privileged accounts

  • Security's Identity Crisis: Are You Overlooking The #1 Attack Vector?

    Sponsored by: Centrify Corporation

    According to Gemalto's Breach Level Index Report, breaches were up 164% in 2017. This e-book explores security's identity crisis, helps you assess your current security approach, and offers a method to strengthen your company's identity controls.

  • Police Department Locks Down Remote Access

    Sponsored by: One Identity

    Explore this case study to gain insight into how a police department increased security of mobile computing devices as well as met compliance with federal requirements to provide secure remote access.

  • What is Attribute-Based Access Control?

    Sponsored by: Axiomatics

    Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.

  • How to Align with the NIST Cybersecurity Framework

    Sponsored by: SecurityMatters

    Many organizations are embracing the NIST Cybersecurity Framework to manage their cybersecurity risks. This e-book reveals how to align with the NIST Cybersecurity Framework, the 3 components of the framework and its benefits.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.