ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Multimedia

  • Identity Analytics: A More Collective Defense

    Sponsored by: One Identity

    As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.

  • Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

    Sponsored by: One Identity

    In this webinar, take a look at the top 5 ways for analyzing account entitlements and learn how areas of risk can be identified before a user (or cybercriminal) can abuse their access.

  • The Future of Privilege Management - Understanding the Bigger Picture

    Sponsored by: One Identity

    In this on-demand webcast, join two IAM experts, Martin Kuppinger and Jackson Shaw, as they talk about the evolution of the Privilege Management market and where the market is moving to.

  • Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach

    Sponsored by: HID Global

    This brief video explores two-factor authentication(2FA) to enhance IAM strategies.

  • Want Security in the Cloud? Look to Identity First

    Sponsored by: Okta

    Join this webcast to discover why modern security starts with identity first and how it can help overcome your cloud frustrations.

  • Strong Authentication Across the Enterprise

    Sponsored by: Okta

    As organizations and workplaces evolve, less control is exercised over devices, services, and networks, leading to a gap with traditional security tools. Tune into this webinar for a look at how your organization can gain strong authentication across the enterprise.

  • The Changing Face of Privileged Access Management

    Sponsored by: One Identity

    Hear from Kelly Hardy and Tyler Reese from One Identity about the importance of privilege access management (PAM) and how you can maintain frictionless security for your organization.

  • Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing

    Sponsored by: WANdisco

    Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.

  • How to Consolidate Identities for Office 365 and Cloud Access

    Sponsored by: Radiant Logic, Inc.

    This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • Preventing Cyber-Attacks with Big Data Security Analytics and SIEM

    Sponsored by: LogRhythm, Inc.

    This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.

  • Mitigating Insider Threats

    Sponsored by: IBM

    This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.

  • Global Security University: IAM Integration Classroom

    Sponsored by: IBM

    This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Podcast: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.

  • Closing the Loop for Effective Network Operations Management Webcast

    Sponsored by: Cisco Systems, Inc.

    This webcast explores the need for operational efficiency in the modern enterprise and why network monitoring and management is so vital. View now to uncover details of a portfolio of networking products that can help you with network visibility, troubleshooting, and more!

  • The Authoritative ID Store Is Dead - How Cloud Changes Provisioning

    Sponsored by: Intel

    Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.

  • Advanced Authentication Methods: Software vs Hardware

    Sponsored by: CA Technologies.

    View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Secure Cloud Access Reference Architecture Model

    Sponsored by: Intel

    Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.

  • Cloud Access 360 Overview Video

    Sponsored by: Intel

    Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.

  • Automating User Provisioning: A User’s Perspective

    Sponsored by: Oracle Corporation

    Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.

  • Secure Cloud Access Reference Architecture & Use Model

    Sponsored by: Intel

    This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection).

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.