ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • 14 Zero Trust eXtended (ZTX) Ecosystem Providers

    Sponsored by: Okta

    Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.

  • BeyondCorp for the Enterprise

    Sponsored by: Banyan Security

    Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.

  • Stop Threats in their Tracks with Incident Response

    Sponsored by: Cisco Umbrella

    In this infographic, discover 5 ways Cisco Incident Response Services can help you strengthen your readiness and response to attacks.

  • How Connected are your Cyber Operations and Business Objectives?

    Sponsored by: Optiv

    Take Optiv’s quiz to help identify how well your cyber operations program is positioned with your organization’s overall business goals and objectives—and see how your cybersecurity stacks up against other organizations.

  • Okta Identity Management for Portals Built on Salesforce.com

    Sponsored by: Okta

    Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.

  • Decoding Customer IAM (CIAM) vs. IAM

    Sponsored by: Okta

    While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.

  • Identity Layer for Web and Mobile Applications

    Sponsored by: Okta

    This data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.

  • The New Era of Fraud: A Bot-Driven Threat

    Sponsored by: F5 Networks

    With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.

  • Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach

    Sponsored by: Optiv

    In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.

  • Top 5 Reasons to Automate Identity Lifecycle

    Sponsored by: Okta

    As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.

  • Pitney Bowes - Okta + F5 joint case study

    Sponsored by: Okta

    In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.

  • Adding Advanced Capabilities into Today's SOC

    Sponsored by: Optiv

    View IDC’s Technology Spotlight, sponsored by Optiv Security, to gain a deeper understanding of enterprise SecOps challenges, key SOC market trends, advanced capabilities in a SOC, and more.

  • Consumer Identity Management for the CMO, CISO, and CIO

    Sponsored by: Okta

    As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.

  • Are Bots Killing Your Business Intelligence?

    Sponsored by: F5 Networks

    While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.

  • The Journey of Security in a DevOps Environment

    Sponsored by: F5 Networks

    To address the increasing demand for application delivery, organizations are adopting DevSecOps: combining the efficiency of DevOps with modern security practices. But how can security be incorporated without disturbing the development process? In this article, uncover the benefits of incorporating security into your DevOps environment.

  • Ransomware Defense Checklist

    Sponsored by: Cisco Umbrella

    The rise of ransomware over the past few years is an ever-growing problem and there are no signs of this lucrative criminal enterprise going away. Our safety checklist will ensure you are ready to defend your organization’s data against these threats. Use this checklist to ensure you are equipped to prevent a future ransomware attack.

  • API Security for Dummies

    Sponsored by: Data Theorem

    API Security for Dummies is a high-level introduction to the key concepts of API security and DevSecOps. Download now for an in-depth overview of the growth of the API economy, API security challenges (how to address them), and automation protection with DevSecOps.

  • NIST Maturity Report

    Sponsored by: Optiv

    The National Institute of Standards and Technology (NIST) cybersecurity framework exists to help organizations better understand, manage, and decrease cybersecurity risk. How aligned is your security program to this industry-accepted framework? Determine your NIST alignment by taking this quick quiz today.

  • Adaptive Multi-Factor Authentication Data Sheet

    Sponsored by: Okta

    Today identity attacks can result in increased security risks, brand damage and outright fraud. Additionally, customers are expecting seamless access with minimal friction. Read on to learn about Okta Adaptive MFA and how it can allow good users in, while keeping attackers out.

  • Building a Well-Managed Cloud Application

    Sponsored by: Okta

    In this white paper, learn how you can increase user adoption and overall usability by simplifying user access and change management.

  • The Next Wave of Bot-Driven Brute Force Attacks

    Sponsored by: F5 Networks

    With most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.

  • Is Noise Pollution Making Your Data Less Secure?

    Sponsored by: F5 Networks

    Automated attacks are increasing in frequency and sophistication, with about 77% of web attacks starting from botnets. With the increasing volume of cyberattacks, it’s critical for organizations to ensure accurate logs. Continue to this article to uncover the importance of logging and how F5’s Advanced WAF service can help.

  • Okta + MuleSoft: Comprehensive API Access Control and Management

    Sponsored by: Okta

    As the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.

  • Okta + Experian: Identity Proofing Your Enterprise

    Sponsored by: Okta

    In this data sheet, find out how Okta and Experian work together to offer enterprises multiple layers of security and proofing to verify a user’s identity, and ensure they are entitled to access the information they’re trying to access.

  • Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects

    Sponsored by: Banyan Security

    Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.