Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed    Add to Google    Add to My Yahoo!
ID Management Multimedia (View All Report Types)
 
Mitigating Insider Threats
sponsored by IBM
WEBCAST: This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
Posted: 14 Aug 2013 | Premiered: Aug 14, 2013

IBM

On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck
sponsored by Dell Software
WEBCAST: Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
Posted: 24 Jul 2007 | Premiered: Jul 24, 2007

Dell Software

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Storage Management FAQ and Software Buying Checklist
sponsored by IBM
WEBCAST: Storage managers are finding it difficult to acquire all the new data while continuing to keep up performance levels and availability, all within their budget. Fortunately, there is new industry leading management software which has proven to have easy navigation and improved performance and analytics.
Posted: 20 Nov 2013 | Premiered: Jul 16, 2012

IBM

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Exploring Workspace ONE: Higher Visibility & Security
sponsored by VMware, Inc.
VIDEO: In this video, learn about an enterprise platform that securely delivers and manages any app on any mobile device by integrating identity management, real-time application delivery, and enterprise mobility management.
Posted: 25 Feb 2016 | Premiered: 09 Feb 2016

VMware, Inc.

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Builders vs. Breakers: 10 Preventable Online Attacks
sponsored by Pluralsight
VIDEO: Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.
Posted: 20 May 2016 | Premiered: 05 May 2014

Pluralsight

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

How to Federate Access and Identity Together for a Complete IdP
sponsored by Radiant Logic, Inc.
WEBCAST: Learn how federating the identity sources behind your IdP takes you the last mile for smarter and richer attribute-based policies.
Posted: 31 Mar 2016 | Premiered: Feb 12, 2016

Radiant Logic, Inc.

Next-Gen Identity: Secure App Access
sponsored by Ping Identity Corporation
WEBCAST: Learn how to control user access to systems and apps to avoid identity theft nightmares in this brief webcast.
Posted: 27 Oct 2015 | Premiered: Aug 14, 2015

Ping Identity Corporation

Secure Centralized Identity and Password Management
sponsored by Dashlane Inc.
WEBCAST: In this webcast, learn how to safely centralize all login credentials for users on their own desktops and mobile devices.
Posted: 07 Dec 2015 | Premiered: Nov 11, 2015

Dashlane Inc.

Deliver Secure Access to Cloud, Mobile, Windows Apps from Any Device
sponsored by VMware, Inc.
VIDEO: This brief video shows a single platform that integrates identity, application, and enterprise mobility management to securely deliver data and apps to any mobile device.
Posted: 26 Feb 2016 | Premiered: 09 Feb 2016

VMware, Inc.

HDAP: the Big Data LDAP Directory Storage
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.
Posted: 28 Mar 2016 | Premiered: Mar 15, 2016

Radiant Logic, Inc.

Simplify Cloud Access and Provisioning with a Federated Identity Service
sponsored by Radiant Logic, Inc.
WEBCAST: What happens when there are users outside of AD-LDAP directories? This webinar examines why simply federating access in your organization isn't enough and how to federate your identity layer.
Posted: 30 Mar 2016 | Premiered: Feb 19, 2016

Radiant Logic, Inc.

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

Benefits & Regulatory Requirements of Electronic Prescribing of Controlled Substances
sponsored by Imprivata
WEBCAST: In this brief webcast, examine the technology and personnel requirements necessary to enable Electronic Prescription of Controlled Substances (ECPS).
Posted: 08 Jun 2015 | Premiered: Dec 3, 2014

Imprivata

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014

SearchMobileComputing

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Security Analytics: Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Managing AWS: Gain Transparency into Cloud Computing
sponsored by Splunk
WEBCAST: Explore how FINRA, the Financial Industry Regulatory Authority, adopted a cloud services platform with both an identity access management feature along and a data management platform to improve the security of their data.
Posted: 07 Apr 2016 | Premiered: Apr 7, 2016

Splunk

Discover how to Optimize your SIEM
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: View this security classroom and learn how to enhance and extend your SIEM technology so it effectively supports incident response. Discover how to assess the variety of vendor products, what noncommercial sources to consider, what costs are involved, and how much heavy lifting is required.
Posted: 14 May 2014 | Premiered: 14 May 2014

SearchSecurity.com

Vulnerability Management Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: How do you win a losing battle—in this case, the battle of vulnerability management? Whether it's Java or Adobe or something you never previously heard of, let's face it: the battle against system vulnerabilities is a losing one.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014

SearchSecurity.com

Enhance your Enterprise's IAM
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This virtual environment explores how you can implement advanced IAM to prevent hacks from coming through third-party vendors and other vulnerable spots.
Posted: 02 Sep 2015 | Premiered: 24 Aug 2015

SearchSecurity.com

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement