IT Reseller and IT Channel Research Library

Powered by Bitpipe.com

Identity Management Research

  • Securing and Illuminating the Pharmaceutical Supply Chain

    Sponsored by: Unisys

    Lack of transparency in the supply chain means a lot of pharmaceutical companies are delivering meds that could be damaged or counterfeit. Learn how one vendor is taking steps to secure and illuminate the entire pharmaceutical supply chain by identifying authentication issues.

  • How Italian Insurance Consortium Tightened Data Security

    Sponsored by: One Identity

    In this case study, learn how an Italian insurance consortium delivered skilled support to its customers while also maintaining their systems and ensuring data security and compliance.

  • CW Nordics May 2017

    Sponsored by: ComputerWeekly.com

    The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.

  • The Right Tools Smooth the DevOps Transition

    Sponsored by: Splunk

    Before your DevOps team jumps on board with AWS, you need a full array of tools from either AWS or third parties. This e-guide covers how to avoid errors in releasing code in AWS, how to select the right combination of AWS and third party tools for your business needs, and more.

  • CW Benelux - May 2017: 3D printing on the rise

    Sponsored by: ComputerWeekly.com

    Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.

  • Information Security magazine Insider Edition, April 2017

    Sponsored by: SearchSecurity.com

    Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools.

  • 3 Common Password Policy Mistakes

    Sponsored by: Specops Software

    Most organizations don't have adequate password policy requirements. Take a look at the 3 common password policy mistakes that your organization might be making.

  • Are PCI Compliant Passwords Good Enough?

    Sponsored by: Specops Software

    Learn what your business can do to make data more secure and be compliant with PCI. Discover tools and best practices that enhance password definition criteria.

  • Deploying OpenShift Container Platform 3 on Google Cloud Platform

    Sponsored by: Red Hat

    This guide dives into an in-depth example demonstrating how OpenShift Container Platform 3 can be set up to take advantage of the native high availability capabilities of Kubernetes in order to create a highly available OpenShift Container Platform 3 environment.

  • Compliance and Beyond: Future-Proofing Your Password Policy

    Sponsored by: Specops Software

    This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.

  • Your Guide to Trends in Mobile User Authentication

    Sponsored by: HID

    As mobile devices play a greater role in corporate computing and employees become more reliant on them, new security challenges emerge and existing ones become more complex. Access this white paper to discover how the risk of unauthorized access to mobile devices adds new requirements for user authentication.

  • Single Secure Credential to Access Facilities and IT Resources

    Sponsored by: HID

    Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.

  • 5 Reasons Why Mobile Will Transform Enterprise Authentication

    Sponsored by: Entrust, Inc.

    Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.

  • Accelerating Business Transformation with Effortless Authentication

    Sponsored by: Entrust, Inc.

    In this white paper learn how to attain enterprise-grade authentication and enable bold digital business strategies via foundational security.

  • Third-Party Risk Management: How to Avoid the Dangers of Weak Controls

    Sponsored by: ModoModo

    If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.

  • Protecting and Empowering Your Connected Organization

    Sponsored by: Microsoft

    Identity management, device management, and information protection have drastically changed due to the rise of mobility. Access this e-book to learn how to get the protection you need for your mobile enterprise.

  • Trends in Mobile User Authentication

    Sponsored by: HID

    To keep pace with the escalation of mobile device use, IT departments need to explore new options that provide easy-to use yet highly secure authentication that works across all types of mobile devices. Access this resource to learn how to reduce multiple, complex passwords while enhancing safety and mobile security.

  • Banking Security in Today's Mobile World

    Sponsored by: HID

    This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.

  • How to Ensure Mobile Employee Productivity with a Secure EMM Strategy

    Sponsored by: BlackBerry

    Today an EMM strategy is not just about meeting employee demands for anytime, anywhere access to data and applications, it's also about maximizing employee productivity while keeping up with those demands. Discover an EMM suite that enhances mobile worker productivity and ensures mobile security.

  • Mobile Security Challenges: Solutions and Best Practices

    Sponsored by: BlackBerry

    Today is an era of "mobile-first" everything and companies are transforming their operations by leveraging mobile technology. However, mobility hasn't come without its challenges. Discover solutions to common mobility issues such as identity management, and how to ensure your mobile-first operations are mission critical and IoT optimized.

  • Top Mobile Security Threats IT Needs to Know About

    Sponsored by: BlackBerry

    In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.

  • How IAM has Evolved on the Cloud: The Good and the Bad

    Sponsored by: IBM

    Learn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • The Digital Certificate: How It Works, Which to Buy

    Sponsored by: SearchSecurity.com

    If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

IT Reseller and IT Channel Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.