You've requested...

Fakten zur Cloud: Identitäts- und Zugriffsmanagement mit Bedrohungserkennung

If a new window did not open, click here to view this asset.

Download this next:

A Starting Point for Your Zero-trust Journey

So, you want to launch your journey to zero trust, but you’re wondering where to begin. This IBM paper advises to set identity and access management (IAM) as your starting point. But why?

Along with answering that question, the paper considers how to:

  • Balance security and smooth user experiences
  • Administer access controls that defend against insider threats
  • And more

Read on to unlock insights that can guide your path to zero-trust adoption.

These are also closely related to: "Fakten zur Cloud: Identitäts- und Zugriffsmanagement mit Bedrohungserkennung"

  • How to spend your budget and time wisely when moving your organisation to the cloud in the Middle East

    We focus on cloud computing with a Middle Eastern spin. According to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money. However, it is not just money that can be lost with downtime, with the knock-on effects potentially having damaging consequences for a company’s brand value. Read a cloud migration checklist in this issue to help protect your reputation and cloud investments.

    Also, read how an education network in the United Arab Emirates is giving students access to resources by linking up multiple education systems in the country and abroad through a cloud-based learning management system.

  • Computer Weekly – 3 September 2019: From IT disaster to digital innovation at RBS

    In this week’s Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards “passwordless” security. 

    Also featured:

    • OpenShift is a key ingredient in the latest move in IBM’s long-running cloud strategy. We look at what it means.
    • In the final part of our buyer’s guide to big data architecture, we look at how exponential growth in data is driving the IT industry to re-engineer long-held views of information management.
    • Hyper-converged infrastructure (HCI) can be an easy win when it comes to datacentre infrastructure upgrades, but there are pitfalls. We look at how best to sidestep them.

Find more content like what you just read:

  • Data security: Don't make these 5 common mistakes

    Take a look through this IBM Security e-book to learn how to avoid five common data security missteps.


  • Cloud security & IAM: Security essentials

    Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.


  • The role of AI to combat the global “identity crisis”

    According to IBM X-Force®, IBM Consulting’s offensive and defensive security services arm, “logging in” with valid credentials is increasingly a preferred weapon of choice for cybercriminals. Download this white paper to explore the role of AI to combat the global “identity crisis.”


  • SIEM 101: 5 benefits your organization can leverage

    Download this infographic to learn about five key capabilities that SIEM can provide and an Enterprise Strategy Group–validated SIEM solution.


  • DSP report: Top vendors, guidance & recommendations

    In the face of increasing threats to data security – phishing and malware attacks, poor data lifecycle management and inadequate auditing, to name a few – many organizations have employed a data security platform. In this KuppingerCole report, compare platforms that are leading the market.


  • 9 IBM Cloud Paks for app modernization and cloud efforts

    It takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.


  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.


  • Why it's time to strengthen your data protection strategy

    Take a look through this overview to learn about an approach to defending both offline and local copies of your data against ransomware threats.


  • Identity Security: Why it Matters and Why Now

    It is no longer a question of if an organization will be hit by a cyber attack but a question of when. Read this paper to learn why Identity Security could be the key factor in preventing cyber attacks from happening.


  • Computer Weekly – 21 February 2017: How to develop mobile apps for business

    In this week's Computer Weekly, our latest buyer's guide examines the emerging innovations and best practice in mobile app development. We find out how Microsoft and Amazon are opening up their artificial intelligence tools to developers. And GE's CIO discusses the digital transformation of one of the world's industrial giants. Read the issue now.


  • 10 benefits of AI-powered identity compliance

    Meeting and maintaining compliance entails high volumes of work, often comprised of tedious, repetitive and redundant tasks. With AI you can meet compliance, secure identities, and save resources by automating these tasks. Read this e-book to learn more.


  • Identity security: Transforming how organizations meet regulatory compliance

    Meeting regulatory compliance is a complex challenge that can introduce further challenges into already difficult business. SailPoint AI-driven identity security ensures authorized access to sensitive data, allowing for an easier compliance process through the following benefits. Read on to learn more.


  • A guide to where mainframes fit in the cloud

    Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.


  • Computer Weekly – 12 December 2023: Shaping the modern workplace

    In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.


  • Jargon Buster Guide to Post Quantum Cryptography

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.


  • What data security looks like in 2024

    These days, your sensitive data likely exists in multiple places, both outside of and within your company. How can you ensure that your data is safe in all its locations? Check out this overview to learn how a data security posture management solution can help.


  • Benelux focus: Moving to the cloud

    We look at the evolution of cloud computing take up, with some examples from the Netherlands, then we analyse some of the challenges and opportunities cloud computing brings.


  • 8 secure file transfer services for the enterprise

    Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.


  • Clients tell-all in Linux simplification and innovation for enterprises

    In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.


  • Data classification tools: What they do and who makes them

    Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.


  • CW APAC October 2023 – Buyer’s guide to IAM

    Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.


  • Cyber-resilient data storage for everyone

    The IBM Storage FlashSystem family meets the full range of cyber-resilient enterprise storage needs in one portfolio. This Ebook dives into the benefits of a business choosing IBM Storage FlashSystem and introduces the reader to the storage solutions.


  • Multicloud challenges: From security to provisioning

    In this expert-guide, explore how the growth of the multicloud has impacted networking strategies from security to provisioning. Then, read on to learn how a cloud management platform can help you solve these challenges, as well as what capabilities it must have to be effective.


  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.


  • Do cloud right with a unified platform for your entire digital estate

    According to a recent study, only 10% of organizations consider themselves to be truly cloud powered. So how can you get the most out of their cloud, and achieve a unified platform for your entire digital estate? Download this white paper to realize the full benefits of your cloud investments and access a blueprint for doing cloud right.


  • Hybrid cloud: What enterprises need to know today

    In this e-guide, we take a look at some of the latest thinking and trends around hybrid cloud, and shine a light on some of the enterprises who are favouring this IT infrastructure approach.


  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why


  • 10 reasons you should consider AI-powered endpoint security

    In this overview, discover ten reasons why you should consider adopting an EDR solution that is powered by AI and automation.


  • An introduction to quantum computing

    Quantum computing promises to revolutionise the capabilities of IT and take it to the next level beyond Moore's Law. But we're not there yet, and there is much to do before it reaches the mainstream. In this guide, we examine the challenges and opportunities of quantum computing.


  • CW APAC: Expert advice on zero-trust security

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.


  • Hybrid cloud: Building bridges between the cloud and enterprise datacentres

    In this e-guide, we take a closer look at how the major cloud providers are making it possible for their users to shift their datacentre-based applications and workloads to the cloud, as enterprise demand for hybrid deployments continues to soar.


  • PHC Test sessions res

    PHC Test sessions res


  • IBM Cloud: No shift, Sherlock

    OpenShift is a key ingredient in the latest shift in IBM's long-running cloud strategy. We look at what it means...


  • Computer Weekly – 6 September 2022: Out with the old at Asda

    In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.


  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.


  • Top 10 cloud stories 2018

    While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.


  • Computer Weekly – 7 August 2018: How digital is driving golf to the connected course

    In this week's Computer Weekly, we find out how one of the most traditional of sports, golf, is turning to technology to engage a new audience and build the connected course. Industry legend Stephanie 'Steve' Shirley discusses skills, diversity in tech and Brexit fears. And we assess four of the biggest cloud storage providers. Read the issue now.


  • Cloud migration: What enterprises need to know

    In this e-guide, we take a closer look at what enterprises need to consider to make moving to the cloud as seamless as possible, while sharing some success stories of big name enterprises that have already successfully done it.


  • CW ANZ: Taming the data beast

    Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.


  • Get started simplifying IT infrastructure with automation

    In the spirit of open, find in this e-book a compilation of success stories from Red Hat customers who use infrastructure automation to create repeatable instructions and processes that replace or reduce human interaction with IT systems.


  • Top 10 software development stories of 2019

    There has never been a better time to be in software development. After years of being regarded as non-core, software development has quickly become a differentiator as businesses embark on digital transformations. Here are Computer Weekly's top 10 software development articles of 2019.


  • How MSPs Can Unlock a Compliance Revenue Stream

    What if MSPs could unlock a new revenue stream? Download this white paper to learn about compliance-as-a-service (CaaS), a new cloud service through which MSPs can manage clients’ compliance standards to ensure regulatory excellence and improved security.


  • 5 endpoint security best practices

    With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.


  • Event recap: VMworld 2018 Europe

    It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.


  • Case study: How AWS and AllCloud helped build a hybrid event platform

    VOK DAMS, an international communications agency for events and live marketing, needed a way to create a platform for hosting hybrid events with both digital and in-person participants. Check out this brief case study to explore the benefits of working with AWS and AllCloud to build a foundation for your business innovation needs.


  • Understanding the modern EDR market: Buyer's guide & more

    To understand the four elements of modern endpoint detection and response (EDR) and how to find a solution that can deliver them, take a look through this buyer’s guide.


  • IT Project: Internet of Things

    The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.