ComputerWeekly.com Research Library

Powered by Bitpipe.com

Access Rights White Papers

  • Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.

  • Comparing Azure Active Directory options

    Sponsored by: TechTarget ComputerWeekly.com

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

  • Top 11 cloud security challenges and how to combat them

    Sponsored by: TechTarget ComputerWeekly.com

    Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.

  • The ultimate guide to identity & access management

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.

  • Infographic: 5 cybersecurity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.

  • Computer Weekly – 19 January 2021: The UK's struggle with digital schooling

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.

  • Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

  • Making Sure Your Identity and Access Management Program is Doing What You Need

    Sponsored by: TechTarget Security

    Identity and access management (IAM) can cause a multitude of issues within an organization if not managed properly. This expert guide explores how to ensure your identity and access management services enable and support the established CIO priorities.

  • Stopping Privilege Creep: Limiting User Privileges with Access Reviews

    Sponsored by: TechTarget Security

    This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!

  • Extended Enterprise Poses Identity and Access Management Challenges

    Sponsored by: TechTarget Security

    Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

  • Security Access Controls Over Identities Must Be Priority

    Sponsored by: TechTarget Security

    No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • The State of Cybersecurity and How It Will Evolve

    Sponsored by: ALTR

    Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.

  • Aligning your Enterprise Identity and Access Management Strategy

    Sponsored by: DLT Solutions

    This expert e-guide covers how you can align identity and access management with CIO and business priorities.

  • Identity and Access Management (IAM) in the Cloud

    Sponsored by: DLT Solutions

    This expert e-guide explores the growing market for cloud-based identity and access management.

  • IBM Security Priviledged Identity Management

    Sponsored by: IBM

    This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.

  • Cisco Any Device: Planning a Productive, Secure and Competitive Future

    Sponsored by: Cisco

    Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.

  • Avoiding Insider Threats to Enterprise Security

    Sponsored by: IBM

    This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Okta Active Directory Integration - An Architecture Overview

    Sponsored by: Okta

    This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.

  • Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World

    Sponsored by: OpenText Security Solutions

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • Handbook: Identity and Access Management

    Sponsored by: TechTarget Security

    In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.