IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management and Access ControlMultimedia (View All Report Types)
 
Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

The "Hard Truths" About Managing Administrative and Application Identities
sponsored by Cyber-Ark Software
VIDEOCAST: This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)

Cyber-Ark Software

Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Three Key Areas for Improving your Compliance Programs
sponsored by CA Technologies.
PODCAST: This podcast focuses on the area of compliance, with a particular emphasis on the role of identity and access management in achieving compliance. It explores some of the key issues in compliance, and highlights techniques and best practices in identity and access management that can simplify and strengthen your compliance challenges.
Posted: 24 Nov 2010 | Premiered: Oct 21, 2010

CA Technologies.

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE: ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006

Microsoft

The Promise of Content-Aware Identity and Access Management
sponsored by CA Technologies.
PODCAST: This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy.
Posted: 24 Nov 2010 | Premiered: Oct 13, 2010

CA Technologies.

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO: This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement