SSO and Beyond: Why Single Sign-On Solutions are Absolutely Essential, but Rarely Enough

The adoption of cloud-based services is gathering pace. Indeed, a recent survey conducted by CDW found that 39% of organisations are “implementing or maintaining cloud solutions”, a figure that is up 28% on two years ago. The growth in cloud computing is, however, giving rise to a proliferation of inadequate passwords that are weakening IT security and placing users, systems and data at increased risk.

Spotlight

CDW

In every organization, there are people who get technology. And people who don't. This is where CDW comes in. CDW is a leading provider of technology solutions for business, government, education and healthcare in the US and Canada. We're a 6,000-plus-member team.

OTHER WHITEPAPERS
news image

Be a C-suite hero with these 5 key virtual + physical data protection takeaways.

whitePaper |

Redefine your business goals and drivers for data protection, and think like a CIO when you apply the five key takeaways in this eBook. Discover alternative approaches to protect your hybrid, virtual and physical environments, and embrace new solutions to secure your data assets.

Read More
news image

2014 Network Security & Cyber Risk Management

whitePaper |

The vast majority of risk professionals, senior executives and board members in the Asia-Pacific region acknowledge that network and information security risks are a threat to their organisations. Most consider the exposures as serious enough to be made the focus of specific risk management activities. However, under one third of organisations surveyed currently purchase insurance as part of their cyber risk management strategy"

Read More
news image

ATM Security Using Fingerprint Authentication and OTP

whitePaper |

In this paper, the authors propose to add more security to the current ATM (Automated Teller Machine) systems. By using biometric authentication and GSM (Global System for Mobile communication) technology, they can overcome many of the flaws introduced by their current ATM system such as shoulder surfing, use of skimming device, etc. In this paper, bankers will collect the customer's as well as respective nominee's fingerprint and mobile number at the time of opening the account. The primary step is to verify currently provided fingerprint with the fingerprint which is registered in the bank's database at the time of account opening.

Read More
news image

How to Defend Against Advanced Persistent Threats

whitePaper |

"This whitepaper defines the differences between Advanced Persistent Threats (APT) and ""commodity threats,"" reviews the types of advanced threat actors and the stages of advanced threat attacks and recommends specific steps for strengthening your defenses against advanced threats. Effective IT security organizations must be able to identify APT actors that may be targeting them, understand their motives and stop them from achieving their objectives. This white paper defines how specific Dell SecureWorks services can help organizations with the four critical capabilities needed for APT defense: Intelligence and visibility; Operations; Incident response."

Read More
news image

The Enterprise at Risk: The 2015 State of Mobility Security

whitePaper |

When it comes to mobility, enterprises are not nearly as secure as their security leaders believe them to be.

Read More
news image

Protecting Patient Health Information in the HITECH Era

whitePaper |

The American Healthcare system is getting a complete facelift thanks to incentives to adopt Health Information Technology introduced by the Health Information Technology for Economic and Clinical Health (HITECH) Act. The HITECH Act contains tools for the enforcement of HIPAA regulations, as well as incentives to accelerate the adoption of information systems that reduce costs, gain efficiencies, and ultimately improve patient care while keeping patient health information secure. This paper examines the HITECH Act, the enforcement mechanisms the HITECH Act provides for HIPAA, and the key security challenges healthcare services face in order to protect patient health information as part of becoming HIPAA compliant.

Read More

Spotlight

CDW

In every organization, there are people who get technology. And people who don't. This is where CDW comes in. CDW is a leading provider of technology solutions for business, government, education and healthcare in the US and Canada. We're a 6,000-plus-member team.

Events