ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control Multimedia

  • Credential Stuffing 2020: Attack Tools and Trends

    Sponsored by: F5 Networks

    Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.

  • The key implementation considerations for successful customer identity management

    Sponsored by: Okta

    In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.

  • Improving Online Customer Experience with Identity Management

    Sponsored by: Okta

    Does the adoption of identity and access management (IAM) affect organizations and users differently? In this video, join 2 distinguished security experts as they overview the affect that IAM can – and will – have on users across digital interactions.

  • The Importance of Identity in Securing Your Business

    Sponsored by: Okta

    Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.

  • Azure Essentials: Defense in depth security

    Sponsored by: TechData - Microsoft

    As cloud becomes more widely adopted, security across these expanding cloud environments needs to improve to keep pace with modern threats and operational requirements. Watch this video to learn more about Microsoft Azure’s cloud security, management and control capabilities, including how it leverages machine learning.

  • Shifting Pam Into High Gear with Zero Standing Privilege

    Sponsored by: Remediant

    Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.

  • SMBs Need Improved Defenses to Protect Remote Workers

    Sponsored by: Citrix

    Regardless of the outcome of this pandemic, it’s beginning to look like remote work will continue for the foreseeable future – especially among SMBs. In this webinar, explore the increasing risks and opportunities as they relate to securing remote workforces at SMBs, and discover how Citrix’s zero trust platform can help.

  • Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield

    Sponsored by: Remediant

    Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.

  • How to Achieve Zero Touch in a Zero Trust Environment

    Sponsored by: BlackBerry

    Implementing perimeter-based security architecture against modern threats will prove futile. Today, security must be traced back to the user, and networks must always be assumed as hostile. But doing so puts employee productivity at risk. Watch this webcast to go in-depth about zero trust and it can be balanced with functionality.

  • Connect, Enable and Protect Your Workforce

    Sponsored by: IBM

    Although the massive shift towards remote work seemed like a temporary protocol at first, this new way of working looks to be the norm for the foreseeable future. Luckily, securing a remote workforce doesn’t require a massive restructure. Watch this webinar to see how IBM is helping organizations embrace the new normal.

  • Addressing Enterprise Security Challenges

    Sponsored by: Rackspace

    In this webinar, you’ll hear from 2 keynote speakers. The first speaker is an AWS Specialist Solutions Architect who provides an in-depth analysis of the most pressing cybersecurity challenges for enterprises. The second speaker, an Principal Architect at Rackspace, takes over to discuss achieving operational efficiency in cloud environments.

  • Continuously Trust Zero

    Sponsored by: IBM

    Data centers are no longer the control points they used to be, and therefore the traditional ‘perimeter’ defense is no longer as effective. As businesses shift to the cloud, DCs become increasingly distributed, and so more appointed security is required. Watch this webinar for a look at how a large company introduces a zero trust approach.

  • How IT Security is Adapting to the Changing Environment in 2020

    Sponsored by: Cisco Umbrella

    With COVID-19 upon the world, IT security professionals are asking: What are the main challenges organizations are facing? What are some of the trends in the security market today? How can businesses adapt to stay secure now that employees and customers are working from home? Watch this webcast for a look at answers to these questions.

  • Product Video: Enterprise Application Access

    Sponsored by: Akamai Technologies

    With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.

  • Remediant SecureONE

    Sponsored by: Remediant

    View this tutorial of Remediant SecureONE to uncover how the privileged access management solution works, how it operates without any agents, and how companies can get to scale quickly by using it.

  • Panel Discussion: Securing the Cloud

    Sponsored by: Dell SecureWorks

    The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.

  • SailPoint Identity Now: Certification Creation

    Sponsored by: SailPoint Technologies

    Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.

  • SailPoint Identity Hub: Search, Track & Manage Access

    Sponsored by: SailPoint Technologies

    The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.

  • Identity Governance for Workday

    Sponsored by: SailPoint Technologies

    In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.

  • SailPoint Identity Now: Certification Process Overview

    Sponsored by: SailPoint Technologies

    In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.

  • SailPoint Identity Now: Dashboard Overview

    Sponsored by: SailPoint Technologies

    In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.

  • Creating Digital Trust: Anchoring Remote Users to Real Identities

    Sponsored by: Onfido

    As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.

  • IdentityNow Short Video: Separation of Duties

    Sponsored by: SailPoint Technologies

    Separation of Duties (SOD) is an internal control mechanism designed to prevent error and fraud by ensuring at least two individuals are responsible for separate parts of any high risk or sensitive tasks. SOD policies for identity systems, however, can be difficult and complex to manage. Find out how IdentityNow makes it easier.

  • Sailpoint Final

    Sponsored by: SailPoint Technologies

    When a company has over 10,000 employees, over 100 applications, and different privileges within those applications, there’s a lot to protect. That’s why SailPoint simplifies identity management for enterprises with automation. View this short video to learn more.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.