Access Authentication and Authorization Reports

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Strategies for Enhancing the Clinician’s Workstation Productivity
sponsored by Siemens
WHITE PAPER: Access this resource to learn about the top 3 challenges with clinician desktop and workspace productivity, and which key strategies (e.g. desktop virtualization, single sign-on, etc.) will help enhance workflows, therefore improving clinical IT adoption.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Siemens

Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign