ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • How Privileged Access Management Protects State and Local Agencies

    Sponsored by: Cyber-Ark Software

    Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.

  • Consumer Authentication

    Sponsored by: Ping Identity Corporation

    Consumer authentication services enable online retailers and eCommerce organizations to shift away from passwords, which continue to pose a security risk. This report highlights some of the key players and offerings in the consumer authentication market, as well as a guide for choosing the right vendor. Read on to learn more.

  • 4 Actions to Secure Work from Home Employees

    Sponsored by: Ping Identity Corporation

    Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.

  • Finding Peace of Mind in Your Security Strategy

    Sponsored by: Rackspace

    As successful breaches continue to plague organizations, it’s more important than ever to evaluate common risk areas and address them accordingly. In this webcast, join the SVP of Security at Alert Logic as they highlight key areas of vulnerabilities and how threats are evolving with organizational infrastructure. Read on to learn more.

  • Season 2 Episode 3 Diving into WAF and on Ways to Prevent DDoS

    Sponsored by: Rackspace

    In this episode of ‘CloudSpotting’ by Rackspace, join the hosts as they explore Web Application Firewalls (WAFs) and the business impacts of DDoS. Give the podcast a listen now.

  • Cyber Confidence: Building a Trustworthy Security Posture

    Sponsored by: Nominet

    As cyberattacks continue to grow more costly and disruptive, IT security teams are put under an increasing amount of pressure to address these challenges. To better understand the security landscape, Nominet conducted a study designed to answer key questions related to cyber confidence and threat management. Read on to unlock the results.

  • Locking Down Private Security

    Sponsored by: Rackspace

    The most common concerns related to cloud migrations are typically related to security. However, cloud users – especially private cloud users – often realize improvements to their security. In this white paper, discover key security challenges and learn how organizations are evolving their defenses to meet the needs of the private cloud.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.

  • Re-thinking Application Security

    Sponsored by: Tala Security

    Although customer-facing applications enable a better user experience, they remain one of the most vulnerable areas of an organization. Traditional security fails to prevent attacks targeting apps – so, how can organizations ensure security? This white paper outlines how to re-think application security in order to address modern threats.

  • Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice

    Sponsored by: Tala Security

    When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.

  • Cybersecurity for Remote Workers

    Sponsored by: Cisco Umbrella

    As the network changes, so too does attack methodology. Today’s threats often target remote users, and security teams need a way to ensure HQ workers receive the same level of protection as those who work from home. This e-book addresses these challenges and offers a potential fix: DNS-layer security. Read the e-book to learn more.

  • Ultimate Guide to Multi-factor Authentication

    Sponsored by: Ping Identity Corporation

    When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.

  • Multi-Factor Authentication for Customers

    Sponsored by: Ping Identity Corporation

    Today’s customers are aware of the need for additional security measures and expect organizations to provide. To address the increasing ineffectiveness of passwords, security teams are beginning to embrace customer multi-factor authentication (MFA). Read this white paper to discover the benefits and how it differs from employee MFA.

  • Why Critical National Infrastructure (CNI) Providers Need CNI-Ready Security

    Sponsored by: Nominet

    In the public sector, ensuring the security and availability of critical national infrastructures (CNIs) is paramount. CNI providers maintain key functions ranging from energy to healthcare to transportation, and everything in-between. In this white paper, learn why CNI providers need CNI-ready security and discover how to address this need.

  • Two Years of Active Cyber Defense Infographic

    Sponsored by: Nominet

    Over the past two years, the partnership between the NCSC, GDS and Nominet has yielded the most widely used DNS cyber defense service across the UK public sector. This infographic highlights the key statistics and achievements of this partnership, including their 100% service availability.

  • Enabling Your Enterprise with Fast, Agile, Customer IAM In the Cloud

    Sponsored by: Ping Identity Corporation

    One vector that hackers are eager to expose is sensitive data associated with customer-facing apps and interfaces. The same way that employee IAM enables organizations to control and manage access, customer IAM (CIAM) provides a secure and seamless user experience. Watch this webinar to discover the benefits of incorporating CIAM.

  • The Hard Truth About Winning Against Cyber Threats

    Sponsored by: Dell SecureWorks

    When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.

  • Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations

    Sponsored by: Okta

    For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.

  • Digital Resilience in the Multi-Cloud Era

    Sponsored by: Trustwave

    Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.

  • SafeNet Trusted Access: Cloud-based Access Management as a Service

    Sponsored by: Thales

    While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.

  • Securing data across the enterprise while simplifying IT operations

    Sponsored by: Thales

    The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.

  • Unlocking Omni-Channel with Unified Customer Identity

    Sponsored by: Okta

    To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.

  • Alero Intro

    Sponsored by: CyberArk Software, Inc

    In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.

  • Customer Identity & Access Management (CIAM)

    Sponsored by: Ping Identity Corporation

    Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.

  • The CipherTrust Cloud Key Manager for Multicloud Environments

    Sponsored by: Thales

    Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.