ComputerWeekly.com Research Library

Powered by Bitpipe.com

Password Management Software Research

  • Hitachi ID Bravura Pass

    Sponsored by: Hitachi ID

    With login and password problems continuing to represent 30% of the call volume to a typical help desk, organizations need a way to help users help themselves. Hitachi ID Bravura Pass strives to simplify password management and easily control credentials on-premises and in the cloud. Access this data sheet to view product spec and features.

  • Garancy IAM Suite: Identity & Access Management Solution for Dynamic Companies

    Sponsored by: Beta Systems

    According to Carnegie Mellon, insider attacks are causing almost 200% more damage on average per case than attacks coming from outside. So it must be asked – is your identity and access management (IAM) up to snuff? If you feel as though your IAM suite could use a lookover or even a re-tool, read this data sheet and see what you may be missing.

  • Privileged Access in Healthcare

    Sponsored by: Hitachi ID

    The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and disruption to healthcare delivery at worst. Because of this high risk, healthcare organizations need to carefully manage privileged access. View this data sheet to learn more.

  • Password Security Best Practices for Business

    Sponsored by: Keeper Security Inc

    Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.

  • Privileged Access Management, Single Sign-On & Enterprise Password Managers

    Sponsored by: Keeper Security Inc

    When it comes to establishing effective identity and access management (IAM) practices, organizations can typically go 1 of 3 directions: Privileged access management (PAM), single sign-on (SSO) or enterprise password management. Read on for an analysis of each and discover how to choose the right IAM solution for your business.

  • Keeper Business Datasheet

    Sponsored by: Keeper Security Inc

    81% of data breaches are due to weak, default or stolen passwords – a massive vulnerability that could be addressed with effective password management. In this data sheet, take a closer look at the key features and benefits of Keeper’s password management offering.

  • Would You Bet Your Business On the Strength of Every Employee’s Password?

    Sponsored by: Panda Security

    Password misuse and reuse present way too big a risk for password ‘use’ in general. Plus, passwords are not hard to obtain if you have the right hacking skill set – and they’re sought after, running for about $160 apiece on the dark web. If you’re searching for an alternative to passwords, check out this e-book on two-factor authentication.

  • Take Control of Virtual Desktop Access with Two-Factor Authentication

    Sponsored by: Citrix

    In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Password Management Best Practices

    Sponsored by: Hitachi ID Systems, Inc.

    This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.

  • Password Management Project Roadmap

    Sponsored by: Hitachi ID Systems, Inc.

    As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.

  • Using Microsoft Active Directory in the Domino World

    Sponsored by: PistolStar, Inc.

    Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.

  • Leverage Active Directory with Kerberos to Eliminate HTTP Password

    Sponsored by: PistolStar, Inc.

    This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.

  • Eliminating Notes ID File Password Management: A Ground-breaking Alternative

    Sponsored by: PistolStar, Inc.

    Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.

  • DigitalPersona Pro

    Sponsored by: DigitalPersona

    This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences