ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Multi-Factor Authentication for Customers

    Sponsored by: Ping Identity Corporation

    Today’s customers are aware of the need for additional security measures and expect organizations to provide. To address the increasing ineffectiveness of passwords, security teams are beginning to embrace customer multi-factor authentication (MFA). Read this white paper to discover the benefits and how it differs from employee MFA.

  • Why Critical National Infrastructure (CNI) Providers Need CNI-Ready Security

    Sponsored by: Nominet

    In the public sector, ensuring the security and availability of critical national infrastructures (CNIs) is paramount. CNI providers maintain key functions ranging from energy to healthcare to transportation, and everything in-between. In this white paper, learn why CNI providers need CNI-ready security and discover how to address this need.

  • Two Years of Active Cyber Defense Infographic

    Sponsored by: Nominet

    Over the past two years, the partnership between the NCSC, GDS and Nominet has yielded the most widely used DNS cyber defense service across the UK public sector. This infographic highlights the key statistics and achievements of this partnership, including their 100% service availability.

  • Enabling Your Enterprise with Fast, Agile, Customer IAM In the Cloud

    Sponsored by: Ping Identity Corporation

    One vector that hackers are eager to expose is sensitive data associated with customer-facing apps and interfaces. The same way that employee IAM enables organizations to control and manage access, customer IAM (CIAM) provides a secure and seamless user experience. Watch this webinar to discover the benefits of incorporating CIAM.

  • 5 Ways to Boost Agility by Transforming Workforce Identity

    Sponsored by: Ping Identity Corporation

    Workforce identity management enables security teams to monitor and control which users and devices have access to specific areas of data. In this article, discover how this approach to data management can help organizations boost agility and enhance security.

  • The Hard Truth About Winning Against Cyber Threats

    Sponsored by: Dell SecureWorks

    When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.

  • 4 Steps to Cloud Access Management

    Sponsored by: Thales

    Today’s organizations rely on cloud-based applications as a critical aspect of their environment. However, deliberate security considerations need to be made in order to protect the sensitive data in these cloud tools. In this white paper discover 5 common challenges and 4 actions organizations can take to full cloud access management.

  • What Is Application Security?

    Sponsored by: Veracode, Inc.

    As organizations shift from data hosted in traditional databases to application containers, security needs to also shift to reflect this change. This data sheet provides an overview of application security to equip you with the knowledge you need to get started.

  • Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations

    Sponsored by: Okta

    For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.

  • Digital Resilience in the Multi-Cloud Era

    Sponsored by: Trustwave

    Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.

  • SafeNet Trusted Access: Cloud-based Access Management as a Service

    Sponsored by: Thales

    While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.

  • Securing data across the enterprise while simplifying IT operations

    Sponsored by: Thales

    The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.

  • A Guide to Verifying Users for Marketplaces

    Sponsored by: Vonage

    Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.

  • Rethinking API Security

    Sponsored by: Okta

    APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.

  • Unlocking Omni-Channel with Unified Customer Identity

    Sponsored by: Okta

    To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.

  • Encrypt Everything

    Sponsored by: Thales

    Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security.

  • Thales Data Protection on Demand

    Sponsored by: Thales

    In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.

  • Keeping Up with Data Security Compliance in the Age of Data Privacy Laws

    Sponsored by: InteliSecure

    As more and more data privacy regulations come into play, organizations are constantly tasked with reviewing and revising their security plan to adhere to these laws. This white paper dives deeper into achieving data security in the era of GDPR, CCPA and other legislations. Read on to learn more.

  • Alero Intro

    Sponsored by: CyberArk Software, Inc

    In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.

  • Customer Identity & Access Management (CIAM)

    Sponsored by: Ping Identity Corporation

    Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.

  • The CipherTrust Cloud Key Manager for Multicloud Environments

    Sponsored by: Thales

    Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.

  • Three Cybersecurity Challenges Every Enterprise Needs to Address

    Sponsored by: Trustwave

    As organizations continue to adopt transformative technologies, they must be careful to place equal importance on the security of their network and its data. This infographic highlights the 3 key cybersecurity challenges organizations need to address. Read on to learn more.

  • Secure Access to On-prem Apps & Hybrid Cloud Security

    Sponsored by: Okta

    In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.

  • CA SiteMinder Migration Guide

    Sponsored by: Okta

    To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.

  • Alero Demo

    Sponsored by: CyberArk Software, Inc

    As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.