ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • Securing Transportation Infrastructure

    Sponsored by: Cyber-Ark Software

    Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.

  • Scaling Identity Management to Ensure Customer Loyalty Program Success: Four Case Studies

    Sponsored by: Akamai Technologies

    To successfully grow their loyalty programs and initiatives, leading enterprises are turning to customer identity and access management (CIAM) solutions. In this white paper, learn about the CIAM challenges associated with customer loyalty programs. Also, discover how to address these challenges based on 4 real-world case studies.

  • A Guide for Customer Identity and Access Management (CIAM)

    Sponsored by: Akamai Technologies

    When implementing the concepts, processes, and technologies needed to collect, manage, and utilize digital identity and customer data, companies have 2 basic choices: build or buy. In this white paper, explore the pros and cons of in-house software development versus commercial off-the-shelf solutions.

  • Building a Customer-Obsessed IAM Team

    Sponsored by: Akamai Technologies

    Download this Forrester Report for an overview of the skills and job descriptions required to manage CIAM effectively. This report also details hiring best practices and the typical organizational ownership of CIAM and how it plays with other technology management and business teams.

  • Rethinking Third-party Cyber Risk Management

    Sponsored by: CyberGRX

    In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.

  • CyberArk Privilege Cloud Reduces Risk with PAM SaaS

    Sponsored by: CyberArk Software, Inc

    Creating and executing a successful privileged access security program can seem like a daunting task. Privileged access is pervasive throughout the enterprise and can be difficult to manage without the right tools. In this blog, learn how CyberArk Privilege Cloud can help organizations start their privileged access management journey.

  • Office 365 Anti-Phishing Tools

    Sponsored by: Cisco Umbrella

    Microsoft released a new set of anti-phishing tools available as part of Office 365 Advanced Threat Protection. However, for these features to be effective, administrators need to understand how to use the tools and how to properly implement them. Download this e-guide to learn more.

  • SailPoint Predictive Identity™: The Intelligent Cloud Identity Platform

    Sponsored by: SailPoint Technologies

    Digital transformation has opened up opportunities for greater growth but, it's also introducing challenges. Digital transformation means more users, more apps, and more data – and if not properly addressed, also means more risk. In this solution brief, learn how organizations can address this risk with the help of SailPoint Predictive Identity.

  • Protecting Your Organization from Password Breaches

    Sponsored by: OneLogin

    With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.

  • Advanced AD Bridging for Prodigious IT Gains

    Sponsored by: Centrify Corporation

    Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.

  • Establish Secure DevOps Practices

    Sponsored by: Centrify Corporation

    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • The Anatomy of a Hack: Perception vs. Reality

    Sponsored by: Centrify Corporation

    There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.

  • A Darwinian Approach to Reducing Government Cyber Risk

    Sponsored by: SailPoint Technologies

    Several key trends are creating a new wave of challenges threatening the security of sensitive and classified government data. Fortunately, identity governance is evolving to counter these threats and reduce risk. In this brief, learn more about these challenges and how SailPoint can help by delivering a predictive approach to identity governance.

  • Co-Operative Group's Identity Infrastructure Governs Data, Applications & Users

    Sponsored by: SailPoint Technologies

    The Co-operative Group was struggling to manage and govern access for over 70,000 employees. They lacked a comprehensive identity governance platform to assist with these efforts. Download this case study to learn how the Co-operative Group was able to address these challenges by using SailPoint's identity governance program.

  • The 2019 Zero Trust Privilege Maturity Model Report

    Sponsored by: Centrify Corporation

    To provide context around the current state of Zero Trust Privilege, Centrify surveyed 1,300 information security professionals. Download this 2019 report to learn more about the Zero Trust Privilege Maturity Model and discover key findings from the survey.

  • Privileged Access Management Buyers' Guide

    Sponsored by: Centrify Corporation

    This buyers' guide is designed to help you choose the right privileged access management solution for your organization. Read on for the 9 major areas needed for your company to achieve strong privileged access management, and compare the features and capabilities to look for when selecting a solution.

  • SailPoint IdentityNow Powered by AI and Machine Learning

    Sponsored by: SailPoint Technologies

    Yesterday's human-based governance approach can no longer keep up with today's exponential growth. Download this brief to learn about SailPoint IdentityNow which introduces the next generation of identity governance to help organizations make intelligent identity decisions with the power of AI and machine learning.

  • How Manulife Is Advancing Its Identity Governance Program with IdentityIQ

    Sponsored by: SailPoint Technologies

    Manulife is advancing their identity governance program with IdentityIQ. In this case study, learn how Manulife was able to reduce risk, improve customer experience, increase efficiency and plan for the future.

  • 6 Steps to Achieving Data Access Governance

    Sponsored by: One Identity

    Organizations need to satisfy compliance requirements and be able to quickly address security threats. They need to centralize the access request process and put an end to ambiguity about who has access to what. In this white paper, discover how organizations can achieve this by following 6 steps to implement data access governance.

  • Identity and Access Management for the Real World: Identity Governance

    Sponsored by: One Identity

    This white paper evaluates what IAM for the real world would, should and can look like. It delves into the most pressing IAM issues faced by virtually every organization and offers actionable, affordable and sustainable approaches to the challenges you face. Read on to learn more.

  • IAM: Managing identity remains key to cyber security

    Sponsored by: ComputerWeekly.com

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

  • Webinar: Latest Fraud Schemes in Retail and Hospitality

    Sponsored by: Shape Security

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

  • The New Frontiers of Identity

    Sponsored by: SailPoint Technologies

    While digital transformation has opened new paths to success, it has also created new frontiers for identity governance that must be addressed. In this webcast, Paul Trulove of SailPoint explains how you can take a comprehensive approach to identity governance.

  • Strategies to Ensure Success for your Governance Project

    Sponsored by: One Identity

    In years past when talking about IAM, the hot topics were single sign-on and role-based access control. However, governance is the goal now, and many organizations are finding it hard to reach. Learn about Identity and Access Governance (IAG), why it's important and how your organization can make an IAG program successful.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.