ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control White Papers

  • Getting Started With Attribute Based Access Control

    Sponsored by: Axiomatics

    How are you protecting access to your most critical assets? Explore this white paper to gain insight into attribute based access control (ABAC) and uncover 3 major steps to deploying an effective program.

  • The City of Frankfurt Enables Work from Home with Two-Factor Authentication

    Sponsored by: One Identity

    Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.

  • What is Attribute-Based Access Control?

    Sponsored by: Axiomatics

    Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.

  • Bell Helicopter Enables Attribute-Based Access Control and Authorization

    Sponsored by: Axiomatics

    In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.

  • Secure Access: Balancing Flexible Network Access with Enterprise-Class Security

    Sponsored by: Fortinet, Inc.

    Read this white paper to find 3 products specifically designed to solve the problem of network access security in the mobile age, and decide for yourself which is the right choice for your business.

  • Fully Managed Microsoft Azure Includes Security Services

    Sponsored by: Rackspace

    Click inside to discover a cloud provider that will help you protect your Azure environments. Read on to learn how they can help to extend your Azure Active Directory IAM system beyond its normal limits, remediate breaches immediately with pre-approved actions, and more.

  • Using Threat Analytics to Protect Privileged Access and Prevent Breaches

    Sponsored by: CA Technologies

    The rise in cyberattacks points to one trend: Static access controls are not enough. Read this white paper to learn 4 steps to using analytics to protect your enterprise from threats both inside and outside your organization.

  • Identity Management and Governance: Bridging the Gap Between IT and Users

    Sponsored by: CA Technologies

    This solution brief explores how an IAM technology that combines robust functionality with an intuitive and business-oriented experience can help you meet modern security challenges

  • Enabling and Securing Digital Transformation

    Sponsored by: CA Technologies

    Read this white paper to learn the specific challenges facing your organizations security capabilities and what's at stake. Then, evaluate how a comprehensive identity and access management system can help you minimize the threats to your environments.

  • Modern IAM: Build Trust Without Sacrificing Security

    Sponsored by: CA Technologies

    This white paper outlines how a modern identity and access management system can help build trust between yourself and your users without infringing on their freedom.

  • Shedding Light on the Cloud App Visibility Blind Spot

    Sponsored by: Forcepoint

    In this white paper, learn how the risk posed by shadow IT has grown, as well as why traditional controls and security policies don't address account-centric threats. Then explore 3 criteria organizations should consider to address the visibility blind spots between themselves and their cloud providers.

  • Overview of AWS Security: Database Services

    Sponsored by: Amazon Web Services

    While the cloud has improved security overall, AWS, aware that it is a large target for cyberattackers hunting for data, has stepped up to the challenge. This white paper gives you an overview of the database security services that AWS provides.

  • Security at Scale: Governance in AWS

    Sponsored by: Amazon Web Services

    Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.

  • Privilege Management Overview: Strengths and Challenges

    Sponsored by: One Identity

    In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.

  • Advanced Authentication Strategies for Detecting Real-time Threats

    Sponsored by: HID Global

    How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.

  • 6 Pillars of Big Data: How to Harness Data with Tableau

    Sponsored by: Tableau Software

    Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of a big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

  • Securing Data Access Within the Healthcare Industry

    Sponsored by: VASCO Data Security International

    Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.

  • Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now

    Sponsored by: IBM

    Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

  • How the Cloud Access Security Broker Space Is Evolving

    Sponsored by: Palerra Inc.

    The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.

  • Defend your Organization with Advanced SIEM and Privileged Account Controls

    Sponsored by: Splunk

    As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.

  • Put Your Business Content to Work

    Sponsored by: IBM

    In this comprehensive resource hub, access 13 guides that will enable you to discover how to extract the most value from your business content and how to make it work for you. Learn about content engagement, data and information governance, sales transformation, and much more.

  • IBM MaaS360 Mobile Application Management

    Sponsored by: IBM MaaS360

    Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.