ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Multimedia

  • SailPoint Identity is Security

    Sponsored by: SailPoint Technologies

    If you can’t see who has access, know what your users are doing, automatically modify or terminate access, or flag suspicious activity, your organization’s security had identity-shaped holes it. In this short video, learn how to secure your organization SailPoint Identity.

  • IdentityNow Short Video: Separation of Duties

    Sponsored by: SailPoint Technologies

    Separation of Duties (SOD) is an internal control mechanism designed to prevent error and fraud by ensuring at least two individuals are responsible for separate parts of any high risk or sensitive tasks. SOD policies for identity systems, however, can be difficult and complex to manage. Find out how IdentityNow makes it easier.

  • Sailpoint Final

    Sponsored by: SailPoint Technologies

    When a company has over 10,000 employees, over 100 applications, and different privileges within those applications, there’s a lot to protect. That’s why SailPoint simplifies identity management for enterprises with automation. View this short video to learn more.

  • Equifax and the 147 Million: One Individual’s Story from behind the Headlines

    Sponsored by: Auth0

    What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.

  • Webinar: Latest Fraud Schemes in Retail and Hospitality

    Sponsored by: Shape Security

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

  • Starbucks Combats Credential Stuffing and Account Takeover

    Sponsored by: Shape Security

    Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    Sponsored by: Veracode, Inc.

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Sponsored by: Ping Identity Corporation

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

  • Kaspersky Internet Security 7.0

    Sponsored by: Kaspersky Lab

    Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.

  • DigitalPersona Pro

    Sponsored by: DigitalPersona

    This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.