ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Research

  • 5 Steps to Raising Ransomware Resistance

    Sponsored by: TechTarget Security

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Time for an IAM Overhaul

    Sponsored by: TechTarget Security

    IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.

  • How to Craft SSO and IAM Strategies on the Cloud

    Sponsored by: OneLogin

    Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Moving Past the Password? Not So Fast

    Sponsored by: TechTarget Security

    The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.

  • Locking up the Cloud with IAM

    Sponsored by: TechTarget Security

    In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: TechTarget Security

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • Computer Weekly: Robots at Your Service

    Sponsored by: TechTarget ComputerWeekly.com

    Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.

  • The Need-to-Know of Today's Cloud Security

    Sponsored by: TechTarget Cloud Computing

    In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.

  • Computer Weekly – 24 November 2015: Technology helping to deliver aid for refugees

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how technology is helping to deliver vital aid to Syrian refugees in the Middle East. We look at the barriers to achieving the government's aim of a paperless NHS. And the CTO of special effects studio Framestore talks about the IT challenges behind hit movies such as Gravity. Read the issue now.

  • Your Role in AWS Security

    Sponsored by: TechTarget Search AWS

    This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.

  • Information Security Magazine: August Issue

    Sponsored by: TechTarget Security

    Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.

  • In denial about DDoS: Defense planning falls short

    Sponsored by: TechTarget Security

    In this expert e-guide, you will learn the finer points of DDoS attacks and what your organization needs to do to protect itself.

  • Computer Weekly – 9 December 2014: The most influential people in UK IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.

  • Aligning your Enterprise Identity and Access Management Strategy

    Sponsored by: DLT Solutions

    This expert e-guide covers how you can align identity and access management with CIO and business priorities.

  • Putting Network Security Into Context

    Sponsored by: TechTarget Networking

    Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise

    Sponsored by: IBM

    Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.

  • IDC 2014 WW MarketScape Report for Federated Identity Management and SSO

    Sponsored by: IBM

    Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.

  • Managing User Identities and Access in the Cloud

    Sponsored by: IBM

    Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.

  • ActivID® Authentication Appliance for Enterprise

    Sponsored by: HID Global

    In this brochure, discover a solution that puts an end to your identity and authentication worries.

  • Identity Management Tech Brief

    Sponsored by: Red Hat

    Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.

  • Information Security ASEAN July 2014

    Sponsored by: TechTarget Security

    This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?

  • Information Security ANZ July 2014

    Sponsored by: TechTarget Security

    This ezine looks at how will new privacy laws impact IT departments in Australia?

  • Who, What, Where? How the Cloud Complicates Identity Management

    Sponsored by: TechTarget Search Windows Server

    In the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.