ComputerWeekly.com Research Library

Powered by Bitpipe.com

Password Management Research

  • Understanding What's at Stake with Privileged Accounts

    Sponsored by: One Identity

    In this podcast episode with two IAM experts from One Identity, learn more about privileged accounts and how you can block bad actors from accessing your company's data.

  • Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.

  • Hitachi ID Identity & Access Management Suite

    Sponsored by: Hitachi ID

    The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.

  • 5 Reasons Relying on Passwords is a Recipe For Disaster

    Sponsored by: OneLogin

    In today's environment—with cybercrime rising and hackers beginning to use machine learning—passwords just don't provide enough protection for businesses. Download this resource for 5 reasons why.

  • Why IT Shouldn't Be the Middle Guy in Password Resets

    Sponsored by: OneLogin

    When users forget their passwords, they need them reset. Guess who's on task? IT is right in the middle of the password reset equation. Download this resource to learn about Single Sign-On and how it can automate this task, so you don't have to be the password reset machine.

  • Authentication Devices

    Sponsored by: HID Global

    Today it's critical to move beyond passwords to more secure authentication methods to ensure the person asking for access is who they say they are. In this product selection guide, take a look at different types of authentication tokens to see which one is right for your organization.

  • Avoid Authentication Anarchy: How to Choose your Authenticator

    Sponsored by: HID Global

    Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.

  • Solving the Password Problem in the Technology Industry

    Sponsored by: OneLogin

    Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.

  • Fighting Fraud - the Future of Digital Onboarding

    Sponsored by: Onfido

    Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Read on to learn how your organization can implement identity best practices without adding friction to any digital onboarding experience.

  • 2018 Beyond the Phish Report

    Sponsored by: Proofpoint

    In this Beyond the Phish report, uncover findings related to end-user risk, including identification of phishing threats, and a comparison of end-user knowledge levels across 16 industries.

  • How to Keep your Enterprise Safe by Improving Password Policies

    Sponsored by: TechTarget

    In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.

  • Computer Weekly – 14 June 2016: The password's the problem – lessons from the LinkedIn breach

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, after millions of LinkedIn users had their data compromised, we look at the lesson to be learned from this latest data breach incident. Our buyer's guide looks at NoSQL technologies and compares Microsoft's and Oracle's offerings. And we examine the benefits of cloud-based data analytics. Read the issue now.

  • A Computer Weekly Buyer's Guide to Access Control

    Sponsored by: ComputerWeekly.com

    In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.

  • Take Control of Virtual Desktop Access with Two-Factor Authentication

    Sponsored by: Citrix

    In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • Moving Past the Password? Not So Fast

    Sponsored by: SearchSecurity.com

    The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: UnitedLex

    While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • How to Properly Move into the Cloud

    Sponsored by: Forum Systems

    This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.

  • ActivID® Authentication Appliance for Enterprise

    Sponsored by: HID Global

    In this brochure, discover a solution that puts an end to your identity and authentication worries.

  • A Guide to Password Use in WebSphere Application Server

    Sponsored by: Global Knowledge

    Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

  • Eagle Bank Keeps Deposits and Customer Data Safe

    Sponsored by: Imprivata

    This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.

  • Chalk Talk: Simplify User Access with NetIQ Solutions

    Sponsored by: NetIQ

    View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.

  • Analytics Case Study: Baker Tilly Revas Finds Reporting Success

    Sponsored by: LogiAnalytics

    This brief case study reveals how the right analytics tool allowed Revas, the outsourcing arm of accounting and consulting firm Baker Tilly, to upgrade reporting and enhance its client portal.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.