ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management White Papers

  • Simplifying Cluster Security at Scale

    Sponsored by: CyberArk

    CyberArk and Red Hat have an approach that centralizes and automates secrets management. This paper explains how solution architects can use these integrated technologies to help organizations strengthen security in Kubernetes clusters across production and development environments in multiple clouds, public and private.

  • ESG Showcase Enhancing Secrets Management for AWS Applications

    Sponsored by: CyberArk

    To get high levels of developer adoption, security teams must use tools that meet developers where they are—for example, integrating with the existing cloud security tools they already use, such as AWS Secrets Manager. View this Enterprise Strategy Group Showcase to enhance secrets management in your company.

  • Computer Weekly – 5 March 2024: Authorised access only – biometrics in the workplace

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now.

  • Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.

  • Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.

  • Computer Weekly – 12 December 2023: Shaping the modern workplace

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.

  • CW APAC October 2023 – Buyer’s guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.

  • How to use a public key and private key in digital signatures

    Sponsored by: TechTarget ComputerWeekly.com

    Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents.

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

  • Centralized vs. decentralized identity management explained

    Sponsored by: TechTarget ComputerWeekly.com

    In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.

  • 6 user authentication types to secure networks

    Sponsored by: TechTarget ComputerWeekly.com

    The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.

  • Comparing Azure Active Directory options

    Sponsored by: TechTarget ComputerWeekly.com

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

  • Identity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

  • Top 11 cloud security challenges and how to combat them

    Sponsored by: TechTarget ComputerWeekly.com

    Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.

  • 5 types of data security

    Sponsored by: TechTarget ComputerWeekly.com

    Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.

  • Multifactor authentication: What are the pros and cons?

    Sponsored by: TechTarget ComputerWeekly.com

    One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.

  • The ultimate guide to identity & access management

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.

  • Infographic: 5 cybersecurity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.

  • 10 types of security incidents and how to handle them

    Sponsored by: TechTarget ComputerWeekly.com

    Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.

  • Computer Weekly – 5 July 2022: How to get the right level of cyber insurance

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

  • Digital Identities: Account Creation & Blockchain Implications

    Sponsored by: Beta Systems

    Digital identities have become a critical aspect of modern digital business. However, ensuring each account is secure and has access to appropriate data and applications can be complicated. Read this e-guide to learn about digital identity account creation and the potential impacts of disruptive technologies, like Blockchain.

  • Your Guide to Password Management & Security

    Sponsored by: Beta Systems

    Passwords remain a pivotal piece in the access management puzzle but can be devastating if credentials fall into the wrong hands. This exclusive e-guide outlines the essentials of password management and security, offering a concrete blueprint for success and highlighting security tips and best practices – read on to get started.

  • Identity and Access Management (IAM) 101

    Sponsored by: Beta Systems

    Identity and access management (IAM) is critical for provisioning (or restricting) user access to certain data, applications and networks – but how exactly does IAM work? And what steps can be put in place to ensure its effectiveness? Read this exclusive e-guide to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.