Security
Topic category


 « All Categories 


« Older Subscribe via RSS to get updates as soon as content is added to this category

Click to view the article Paul Pedley Managing the privacy risks posed by vendors
7th August 2018 Sign in to MyJinfo or create an account be able to star items

In the second of a two-part article on the use of content aggregation services and intelligence platforms and the privacy issues that arise in relation to both the individuals and businesses that deploy those products, Paul Pedley takes a more in-depth look at the potential privacy risks posed by these relationships with vendors in the context of library and information services and how to mitigate those risks by developing a robust plan.

 Read » 


Click to view the article Paul Pedley Content aggregation services and intelligence platforms - the implications for data privacy
26th July 2018 Sign in to MyJinfo or create an account be able to star items

The use of content aggregation services and intelligence platforms gives rise to privacy issues in relation to both the individuals and businesses that deploy those products. As a result, information professionals need to be aware of the risks posed by third-party relationships with vendors, suppliers, and distributors. This article looks at some of the platforms available and the types of data they generate as well as the legal landscape in relation to the privacy of both individuals and companies.

 Read » 


Click to view the article Victoria Alford GDPR - what it means for information professionals
3rd May 2018 Sign in to MyJinfo or create an account be able to star items

Are you up to speed with the General Data Protection Regulation (GDPR), an EU initiative impacting on data privacy across Europe and coming into force on 25th May?

 Read » 


Click to view the article Graham Southorn What does GDPR add to the Data Protection Act?
24th April 2018 Sign in to MyJinfo or create an account be able to star items

In February, SLA Europe president, Katharine Schopflin, presented a webinar in which she examined the imminent changes to existing data protection legislation. This article presents some of the highlights from this webinar and looks at some of the myths around the General Data Protection Regulation (GDPR) and what organisations need to do to be compliant.

 Read » 


Click to view the item Click to view the item Market landscape - authentication and access solutions
Wednesday, 22nd November 2017

In this market landscape we look at eight products in the field of authentication and access: AuthAnvil Gluu server IAM platform Okta IT OneLogin SSO OpenAthens PingFederate Shibboleth Identity Provider WSo2 Identity Server. We provide a brief description of...

 Full details » 


Click to view the article Kate Lomax Impact of Mobile Working on the Digital Workplace
29th February 2016 Sign in to MyJinfo or create an account be able to star items

We know about BYOD but what about the impact on work of CYOD (Choose Your Own Device) and remote working policies? Kate Lomax explores changing expectations of work, new findings about employee engagement, and how employee-owned devices can increase productivity.

 Read » 


Click to view the article Sophie Alexander Options for Authentication - Which Approach Does What?
24th November 2015 Sign in to MyJinfo or create an account be able to star items

User authentication is one of the most challenging aspects of information access and delivery. In a recent FreePint webinar Isabelle Garcia, library manager at Qualcomm, outlined the strengths and weaknesses of different approaches to authentication, including single sign-on, IP authentication as well as other popular tools such as EZproxy. Sophie Alexander extracts practical next steps and need-to-know information in her article.

 Read » 


Click to view the article Catherine Dhanjal Q&A with Eduserv - Authentication in the Information Industry
19th October 2015 Sign in to MyJinfo or create an account be able to star items

The corporate pharma field is research-intensive with literature searching a key component of the work. We interview Eduserv and find out more about their OpenAthens access management product, specfic authentication and access challenges facing corporate libraries, and how Eduserv aims to bring organisations and publishers closer to seamless user access.

 Read » 


Click to view the article Sophie Alexander Q&A with Priory Solutions - ResearchMonitor for Resource Management
16th October 2015 Sign in to MyJinfo or create an account be able to star items

Sophie Alexander interviewed Peter Borchers, managing director of Priory Solutions, to find out more about the company, its products Quest and SmartRecharge, and its flagship online resource management software ResearchMonitor and its cost analysis features. She also looks at what makes them so different from their competitors.

 Read » 


Click to view the article Sophie Alexander Q&A with Eduserv - OpenAthens for Authentication
8th September 2015 Sign in to MyJinfo or create an account be able to star items

The future of authentication solutions is "complex", says Eduserv's Jon Bentley in an interview with researcher Sophie Alexander which covers Eduserv's OpenAthens authentication software, facilitating secure access in a variety of corporations and organisations, and why collaboration is the key to solving the authentication challenge.

 Read » 


Click to view the article Robin Neidorf Anxious about Authentication?
3rd September 2015 Sign in to MyJinfo or create an account be able to star items

Are you overloaded with authentication and terms such as IP, Single Sign-On,  SAML, EZProxy and Good? Take a look at the resources we've developed to help information managers cope with the anxiety of authentication - they're part of the Topic Series, "All About Usage".

 Read » 


Click to view the article Isabelle Garcia Approaches to Authentication
2nd September 2015 Sign in to MyJinfo or create an account be able to star items

Many organisations are struggling to decide on the best approach to authentication - we hear from Isabelle Garcia, an information manager who shares the decisions and conclusions she and her colleagues at wireless technology and innovation company Qualcomm arrived at... and how they made changes to their approach to authentication and worked with vendors and internal colleagues to implement those changes.

 Read » 


Click to view the item Click to view the item Research into Authentication 2015
Thursday, 27th August 2015

Information managers are moving authentication higher up the agenda, fuelled by increased mobile working, new ways of using content, and potential security breaches. In this report we present FreePint's research results into authentication, including the research methodology, respondents... and...

 Full details » 


Click to view the article Robin Neidorf Analysing Authentication Challenges & Approaches - FreePint Research
27th August 2015 Sign in to MyJinfo or create an account be able to star items

Authentication solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user. Large organisations are coping with situations where they're multiplying those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... Find out more about FreePint's research investigating these challenges and approaches.

 Read » 


Click to view the article Robin Neidorf Results from FreePint Research into Authentication, Part 3 - What's Needed
25th August 2015 Sign in to MyJinfo or create an account be able to star items

How can information managers grapple with the complex set of requirements required to solve the challenges of authentication? It's critical to have a strategy for gathering of information, as well as reliable sources of that information. The third installment of analysis of findings from FreePint's research looks as those sources of information as well as free-form comments on technologies from SSO to IP authentication, plus the role of senior leadership and a host of other issues.

 Read » 


Click to view the article Robin Neidorf Results from FreePint Research into Authentication, Part 2 - Approaches and Priorities
24th August 2015 Sign in to MyJinfo or create an account be able to star items

Information managers in many industries are grappling with less-than-perfect authentication methods, with some industries placing greater importance than others on drivers such as a single view of usage or access to resources for partners and affiliates. Read the analysis of findings from FreePint's research into approaches, priorities and plans in the second installment of our feedback on this exciting fresh research.

 Read » 


Click to view the article Robin Neidorf Results from FreePint Research into Authentication, Part 1 - Background and Methodology
20th August 2015 Sign in to MyJinfo or create an account be able to star items

Information managers are moving authentication higher up the agenda, fuelled by increased mobile working, new ways of using content, and potential security breaches. In the first section of results of FreePint's research results we look at the methodology, respondents... and at the factors which make authentication such a unique challenge.

 Read » 


Click to view the article Catherine Dhanjal Grappling with Authentication and Access in the Pharma Field
1st July 2015 Sign in to MyJinfo or create an account be able to star items

As the FreePint Topic Series "All About Usage" launches, Catherine Dhanjal reports from a recent Pharma Documentation Ring (P-D-R) event focusing on "Authentication Technologies - Challenges and Opportunities for the Scientific Corporate Information Centre", where discussion centred around balancing the need to drive a simple, if not seamless, sign-on process for end users against cost, complexity and technical possibilities.

 Read » 


Click to view the article James Mullan Shadow IT - a Significant Threat for Organisations?
30th January 2015 Sign in to MyJinfo or create an account be able to star items

In 2013 James Mullan wrote about "shadow IT" and the potential threat it poses. Now at the start of a new year shadow IT is back on the agenda. There are a number of reasons for this and in this article James looks at two recent reports which highlight some of the concerns organisations have with shadow IT where staff use software and other tools for work reasons which have not been approved by their employers.

 Read » 


Click to view the article Tim Buckley Owen Cloud Services - Not In the Cloud At All
13th November 2014 Sign in to MyJinfo or create an account be able to star items

Whatever their other differences, the United States and Russian authorities seem to be of one mind when it comes to the desire to poke around privately held data whenever they feel like it. Their approaches to penetrating the cloud may be different but the motives are the same. Europe, where big hitters like Microsoft and Salesforce are both planning data centre expansion, may be the gainer because of its generally tougher privacy laws. So for anyone responsible for commissioning or managing an organisation's cloud services, the soil on which those clouds rain is really starting to matter.

 Read » 


« Older Subscribe via RSS to get updates as soon as content is added to this category