ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Consumer Data Right: Open Banking

    Sponsored by: Ping Identity Corporation

    With consumers growing increasingly reliant on digital services and interfaces, the financial industry is evolving to meet these expectations through open banking interfaces. In this solution brief, explore the Ping Identity Platform, designed to meet Australia’s Open Banking requirements while still providing a seamless user experience.

  • IBM Identity and Access Management Services: Costs and Benefits

    Sponsored by: IBM

    Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.

  • Access Management Vendors: Analyst Report

    Sponsored by: IBM

    SaaS-delivered access management has become the norm, and vendors are including API capabilities for integrating authentication and authorization into applications and services. Gartner recently published a Magic Quadrant report for Access Management, which evaluates and compares various AM providers. Read on to learn more.

  • CCPA and Identity Verification

    Sponsored by: IDology

    As 2020 approaches, companies should view CCPA as an opportunity to further engage with their customers, rather than an obstacle. In order to adhere to the requirements, implementing policies that follows the CCPA timeline is imperative.Download this whitepaper to discover why identity verification is so critical to ensuring compliance.

  • Automating Identity & Access Management

    Sponsored by: Hitachi ID

    Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.

  • Simplify, Strengthen and Unify Your Security with Zero Trust Access

    Sponsored by: PortSys

    Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.

  • Structuring an IAM program

    Sponsored by: Hitachi ID

    With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.

  • Password Management with Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.

  • Now Tech: Authentication Management Solutions, Q3 2018

    Sponsored by: IBM

    Organizations use authentication management to simplify processes, reduce operational costs and enhance customer experience by minimizing friction. But selecting a vendor can be overwhelming.In this Forrester report, explore the features of 26 diverse providers in order to help you find a vendor that meets your organizational needs.

  • The Challenges of Trusted Access in a Cloud-First World

    Sponsored by: Thales

    With over 1,050 participants, the 2019 Thales Access Management Index revealed common security trends, concerns and access management technologies around cloud adoption used by today’s organizations. Download the executive summary to uncover the key findings and takeaways towards secure access management.

  • Protecting Data in The Cloud 2019 Thales Cloud Security Study

    Sponsored by: Thales

    During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.

  • Security for Cloud and On-Premises Deployment

    Sponsored by: Mendix

    In this whitepaper, take an in-depth look at the Mendix platform, specifically as it relates to security for cloud, private cloud & on-premises environments. Download this report & discover why businesses across multiple industries trust Mendix to oversee the protection of their mission-critical data.

  • CyberArk Privileged Access Security

    Sponsored by: Cyber-Ark Software

    Privileged accounts, and the access they provide, represent the largest security vulnerabilities an organization faces today. In this CyberArk white paper, discover the industry’s most complete solution to reduce risk created by privileged credentials.

  • RPA Security Best Practices

    Sponsored by: CyberArk Software, Inc

    Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.

  • Securing Robotic Procession Automation (RPA) with CyberArk

    Sponsored by: CyberArk Software, Inc

    Robotic process automation (RPA) enables businesses to execute their digital transformation initiatives by providing a framework to carry out processes faster, longer, more efficiently & with a higher level of quality. In this cheat sheet, discover the benefits of RPA & a service designed to add a layer of security to your RPA strategy.

  • The Business Case for Securing Robotic Process Automation

    Sponsored by: CyberArk Software, Inc

    As organizations consider Robotic Process Automation (RPA), CISOs and security leaders have a timely opportunity to present a business about applying strong cybersecurity to this transformative technology. In this article, find 3 ways to build the business case for RPA security – centered on protecting privileged access.

  • Solving Key Security Challenges in RPA Deployments

    Sponsored by: CyberArk Software, Inc

    Robotic process automation (RPA) has the potential to deliver huge benefits to organizations. However, IT security risks are often overlooked. In this e-book, discover tips on how to mitigate the risks RPA deployments may bring.

  • Identity & Access Management – Securing the Modern Workplace With Microsoft 365

    Sponsored by: Core BTS

    Cyberthreats are the top concern among leaders heading up companies of all sizes, and identity and access management (IAM) is a foundation of enterprise cybersecurity. In this white paper, discover how to secure the modern workplace with Microsoft 365.

  • Remote Vendor Access: A Growing Attack Vector

    Sponsored by: Cyber-Ark Software

    Organizations today rely on 3rd party vendors more than ever. Although these arrangements can provide valuable services, they also bring with them significant security considerations and risk. In this white paper, learn about CyberArk Alero which is designed to provide fast, easy and secure privileged access for remote vendors.

  • Integrating Password and Privilege Management for Unix and Linux Systems

    Sponsored by: BeyondTrust Corporation

    With the knowledge that cyberattacks are often targeted towards accounts with privileged access, organizations often include privileged access management (PAM) at the top of their project list. This report uncovers why PAM strategies are critical to a robust security program.

  • Best Practices for Securing Robotic Process Automation

    Sponsored by: Cyber-Ark Software

    Robotic Process Automation (RPA) is different than traditional business automation, and these differences introduce a growing security challenge: securing the access of credentials used by software robots. In this white paper, explore 5 best practices for securing robot privileged credentials and access.

  • Buyer’s Guide for Complete Privileged Access Management (PAM)

    Sponsored by: BeyondTrust Corporation

    Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.

  • Robotic Process Automation Whiteboard Video

    Sponsored by: CyberArk Software, Inc

    Robotic Process Automation (RPA) platforms can provide organizations with great benefits. However, these platforms introduce a new threat vector based on human and non-human identities. In this video, discover 5 security best practices organizations should consider incorporating into their RPA workflows.

  • Cisco Umbrella: Reporting You Can Count On

    Sponsored by: Cisco Umbrella

    Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.

  • The Power and Potential of Robotic Process Automation—and the Security Risks

    Sponsored by: CyberArk Software, Inc

    What do IT security pros need to know about RPA platforms and the connection to privileged credentials? In this article, learn how CyberArk can help combat the privileged account security challenges for both human and application users.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.