ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Control White Papers

  • Putting the Trust in Zero Trust

    Sponsored by: Lookout

    As workforces become more distributed and employees favor their BYOD devices, cybersecurity risks evolve to the point where traditional perimeter tactics are no longer relevant. Enter zero trust for mobile – a scalable approach to protecting every device within the network. Read on to learn more about this.

  • Twitter Phone Spear Phishing Attack

    Sponsored by: Lookout

    On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.

  • Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy

    Sponsored by: Tehama

    As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.

  • Privileged Access Management to Prevent a Ransomware Attack

    Sponsored by: Hitachi Vantara

    The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.

  • An overview of IBM’s identity & access management services

    Sponsored by: IBM

    This Forrester study, commissioned by IBM, provides an unbiased look at the potential benefits, costs and risk areas of IBM’s Identity and Access Management (IAM) services. Download the report to unlock the key findings from the study and explore a use case that demonstrates the potential of adopting IBM’s IAM services

  • Pragmatic Zero Trust

    Sponsored by: Capgemini

    There is no consistent view of what ‘zero trust’ means in practice, particularly now that vendor marketing teams have the term firmly within their sights and intend to label everything ‘zero trust’ as a result. Read this short blog post to cut through the marketing hype and learn the history, nature, and possible future of ‘zero trust.’

  • 4-step Work From Home Guide

    Sponsored by: HCL Software

    When a crisis manifests, organizations need to respond quickly or risk insolvency. CISOs and security teams must continue to protect sensitive data while teleworking, and IT and security operations must work together to patch and remediate vulnerabilities. Read this BigFix white paper to learn the 4 core capabilities to support secure telework.

  • Technology Supporting People

    Sponsored by: Advizex

    In this case study, discover the results of a healthcare provider’s recent project designed to quantify and better understand the issues they were facing surrounding identity and access management. Read on to discover what led to this project and the outcomes of their partnership with Advizex.

  • Multi-Factor Authentication Buyer's Guide: Getting Started

    Sponsored by: Ping Identity Corporation

    Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.

  • Workforce 360 Integrations Guide

    Sponsored by: Ping Identity Corporation

    To address an ever-evolving environment, you need a solution purpose-built for workforce requirements and use cases. Ping's Workforce360 solution provides centralized authentication services with the capabilities you need.

  • Workforce authentication authority: What is it and what are the benefits?

    Sponsored by: Ping Identity Corporation

    Read this white paper to gain a deeper understanding of the benefits of a workforce authentication authority, its essential capabilities, and the use cases it can support.

  • Survey Report: Evolution of the CASB

    Sponsored by: Proofpoint

    In the wake of COVID-19, work-from-home orders issued by most companies and governments have accelerated the digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the enterprise. View this report to get a perspective on the use of CASBs.

  • Getting Started with CASB

    Sponsored by: Proofpoint

    Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.

  • Strong Customer Authentication (SCA)

    Sponsored by: Vonage

    In recent years, Europe has ramped up on regulations concerning payment services and payment authentication. Legislation requires payment service providers (PSPs) to deliver strong customer authentication (SCA). Jump into this white paper to learn how to remain compliant without compromise.

  • Remediant Secure One Solutions Brief

    Sponsored by: Remediant

    In order to address the growing threat of cyberattacks caused by access mismanagement, Remediant created the zero-standing privilege model to help organizations enhance their identity and access management programs. But what is zero-standing privilege & how does it work? Read this solution brief to find out.

  • Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters

    Sponsored by: Tehama

    Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.

  • The Cost of Insider Threats: Global Report

    Sponsored by: IBM

    The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.

  • The Impact of COVID-19 On IT and Cybersecurity

    Sponsored by: IBM

    What changes were necessary to address the unexpected global pandemic? What types of cybersecurity challenges did the transition present? How are organizations doing? For answers to these questions, read this survey, conducted by ESG, to gain a perspective on the cybersecurity impact of COVID-19 as well as implications for the future.

  • Onboarding Third-Party IT Service Providers Doesn’t Have to be Complicated, Costly, or Risky

    Sponsored by: Tehama

    According to Gartner, the biggest challenge Chief Procurement Officers (CPOs) face is the time it takes to securely onboard outside organizations and vendors into their information systems and business apps. Read this white paper to learn the risks and challenges when hiring third-party IT service providers or providing remote network access.

  • Securing the Workplace of the Future

    Sponsored by: Tehama

    By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.

  • Outbound Email Security Essentials

    Sponsored by: Zivver

    As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.

  • Securing Business Critical Apps in the Age of Digital Transformation

    Sponsored by: CyberArk Software, Inc

    Digital transformation has had a dramatic impact on application security – highlighting a distinct gap between perceived security effectiveness and the harsh reality. Read this white paper to learn more about this inverse relationship and discover 5 ways to secure your organization’s business critical applications.

  • New report: The recognized privileged access management vendors

    Sponsored by: CyberArk Software, Inc

    CyberArk is proud to announce it has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management. The CyberArk Privileged Access Security Solution is used by the majority of Fortune 500 companies, and by government organizations around the globe. Download your complimentary report today to learn why.

  • TOP 5 REASONS TO PRIORITIZE PRIVILEGED ACCESS MANAGEMENT

    Sponsored by: CyberArk Software, Inc

    Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach today. However, ensuring that privileged access is secure is easier said than done. In this white paper, learn about the top 5 reasons your organization should prioritize PAM-as-a-Service.

  • Security Without Compromise

    Sponsored by: Remediant

    As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.