Research Library

Powered by

Identity Management Research

  • Magic Quadrant for Access Management

    Sponsored by: Ping Identity Corporation

    Dive into this Gartner Magic Quadrant for Access Management to see how different vendors in the space stack up.

  • Secure Mobility for Remote Public Sector Workers

    Sponsored by: Lookout Inc.

    Public sector organizations are tasked with the protection and maintenance of highly sensitive information, which is why it’s paramount that employees being enabled to work remotely are done so through a secure, seamless process that manages devices and controls access. Read on to learn how Lookout may be able to address these challenges.

  • Access Policy Manager

    Sponsored by: F5 Networks

    Download this overview to learn about all the benefits of F5’s Access Policy Manager (APM).

  • 5 Ways to Boost Productivity by Transforming Workforce Identity

    Sponsored by: Ping Identity Corporation

    Learn how workforce identity security helps you champion digital transformation by driving efficiencies and productivity across your business.

  • 5 Ways to Boost Security by Transforming Workforce Identity

    Sponsored by: Ping Identity Corporation

    Learn 5 ways to boost security by transforming workforce identity today.

  • Enable and Secure Remote Work During the COVID-19 Pandemic

    Sponsored by: Barracuda

    The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.

  • Mitigating Security Risks for State and Local Government

    Sponsored by: Cyber-Ark Software

    Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.

  • Big-IP Access Policy Manager

    Sponsored by: F5 Networks

    Learn how F5 Big-IP Access Policy Manager delivers unified global access control for your users, devices, applications, and APIs.

  • Getting Customer IAM Right

    Sponsored by: Ping Identity Corporation

    For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.

  • The Perimeter: An Identity Crisis

    Sponsored by: F5 Networks

    Identity and access management (IAM) is growing in popularity as a scalable and pragmatic security approach. This white paper highlights how IAM works, discusses the challenges to adopt this approach and provides IAM best practices to help you get started.

  • How Privileged Access Management Protects State and Local Agencies

    Sponsored by: Cyber-Ark Software

    Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.

  • Consumer Authentication

    Sponsored by: Ping Identity Corporation

    Consumer authentication services enable online retailers and eCommerce organizations to shift away from passwords, which continue to pose a security risk. This report highlights some of the key players and offerings in the consumer authentication market, as well as a guide for choosing the right vendor. Read on to learn more.

  • 4 Actions to Secure Work from Home Employees

    Sponsored by: Ping Identity Corporation

    Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.

  • The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)

    Sponsored by: Cato Networks

    Networking and security are slowing down the business as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).

  • Workforce Authentication Authority

    Sponsored by: Ping Identity Corporation

    Read this white paper to gain a deeper understanding of the benefits of a workforce authentication authority, its essential capabilities, and the use cases it can support.

  • Ultimate Guide to Customer IAM

    Sponsored by: Ping Identity Corporation

    Understanding the opportunities that CIAM brings, how it’s different than enterprise IAM and how to choose and implement a CIAM solution may seem like a daunting task. This guide will put you on the right path to selecting the best CIAM solution for your enterprise.

  • Ultimate Guide to Multi-factor Authentication

    Sponsored by: Ping Identity Corporation

    When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.

  • Multi-Factor Authentication for Customers

    Sponsored by: Ping Identity Corporation

    Today’s customers are aware of the need for additional security measures and expect organizations to provide. To address the increasing ineffectiveness of passwords, security teams are beginning to embrace customer multi-factor authentication (MFA). Read this white paper to discover the benefits and how it differs from employee MFA.

  • Enabling Your Enterprise with Fast, Agile, Customer IAM In the Cloud

    Sponsored by: Ping Identity Corporation

    One vector that hackers are eager to expose is sensitive data associated with customer-facing apps and interfaces. The same way that employee IAM enables organizations to control and manage access, customer IAM (CIAM) provides a secure and seamless user experience. Watch this webinar to discover the benefits of incorporating CIAM.

  • 5 Ways to Boost Agility by Transforming Workforce Identity

    Sponsored by: Ping Identity Corporation

    Workforce identity management enables security teams to monitor and control which users and devices have access to specific areas of data. In this article, discover how this approach to data management can help organizations boost agility and enhance security.

  • Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations

    Sponsored by: Okta

    For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.

  • A Guide to Verifying Users for Marketplaces

    Sponsored by: Vonage

    Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.

  • Rethinking API Security

    Sponsored by: Okta

    APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.

  • Unlocking Omni-Channel with Unified Customer Identity

    Sponsored by: Okta

    To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.

  • Reference Huddle: How Pitney Bowes Solves Business Challenges with Okta

    Sponsored by: Okta

    In this group reference call, Okta speaks with Kenn Bryant, Director of Architecture and SaaS Services at Pitney Bowes, about how they use Okta's APIs to deliver an unmatched customer experience, enable the company to leverage the cloud, and make critical business data more accessible to customers, employees, and partners.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.