IM (Identity Management) Reports

Identity trends for 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
Posted: 01 Mar 2023 | Published: 02 Mar 2023

TechTarget ComputerWeekly.com

CW Benelux - May 2017: 3D printing on the rise
sponsored by TechTarget ComputerWeekly.com
EZINE: Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.
Posted: 08 Feb 2021 | Published: 04 May 2017

TechTarget ComputerWeekly.com

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Oct 2019

TechTarget ComputerWeekly.com

IAM: Key to security and business success in the digital era
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 08 Feb 2021 | Published: 15 Nov 2018

TechTarget ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

The End of the Password?
sponsored by Onfido
EGUIDE: Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.
Posted: 30 May 2019 | Published: 29 May 2019

Onfido

How to Ensure Mobile Employee Productivity with a Secure EMM Strategy
sponsored by BlackBerry
EGUIDE: Today an EMM strategy is not just about meeting employee demands for anytime, anywhere access to data and applications, it's also about maximizing employee productivity while keeping up with those demands. Discover an EMM suite that enhances mobile worker productivity and ensures mobile security.
Posted: 08 May 2017 | Published: 01 May 2017

BlackBerry