ComputerWeekly.com Research Library

Powered by Bitpipe.com

Password Management Software Research

  • Use Your Microsoft Certificate Authority for Passwordless Authentication

    Sponsored by: Entrust, Inc.

    As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.

  • Passwordless Experience for A More Secure and Productive Workforce

    Sponsored by: Entrust, Inc.

    Passwords are quickly becoming an outdated security tool, set to be replaced by passwordless authentication methods. In this solution brief, take a closer look at the key features and capabilities of Entrust Datacard’s passwordless authentication offering, designed to increase productivity, unify access and reduce password-related risks.

  • Duo Security's Two-Factor Authentication Evaluation Guide

    Sponsored by: Duo Security

    As passwords grow increasingly ineffective, new ways of authenticating users and managing identities are needed to ensure the protection of sensitive data. In this evaluation guide, learn the criteria for customizing your evaluation process and discover how to assess the efficacy of a two-factor authentication tool.

  • Passwordless Authentication Solutions by Thales

    Sponsored by: Thales

    Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.

  • Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI

    Sponsored by: Thales

    In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.

  • Why IT Shouldn't Be the Middle Guy in Password Resets

    Sponsored by: OneLogin

    When users forget their passwords, they need them reset. Guess who's on task? IT is right in the middle of the password reset equation. Download this resource to learn about Single Sign-On and how it can automate this task, so you don't have to be the password reset machine.

  • Solving the Password Problem in the Technology Industry

    Sponsored by: OneLogin

    Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.

  • Protecting against modern password cracking

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security.

  • Take Control of Virtual Desktop Access with Two-Factor Authentication

    Sponsored by: Citrix

    In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Password Management Best Practices

    Sponsored by: Hitachi ID Systems, Inc.

    This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.

  • Password Management Project Roadmap

    Sponsored by: Hitachi ID Systems, Inc.

    As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.

  • Using Microsoft Active Directory in the Domino World

    Sponsored by: PistolStar, Inc.

    Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.

  • Leverage Active Directory with Kerberos to Eliminate HTTP Password

    Sponsored by: PistolStar, Inc.

    This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.

  • Eliminating Notes ID File Password Management: A Ground-breaking Alternative

    Sponsored by: PistolStar, Inc.

    Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.

  • DigitalPersona Pro

    Sponsored by: DigitalPersona

    This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.