IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity ManagementMultimedia (View All Report Types)
26 - 33 of 33 Matches Previous Page  |  Next Page
Trusted Computing: Establishing Device Authentication
sponsored by Wave Systems Corp.
VIDEOCAST: View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO: This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

The "Hard Truths" About Managing Administrative and Application Identities
sponsored by Cyber-Ark Software
VIDEOCAST: This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)

Cyber-Ark Software

On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck
sponsored by Dell Software
WEBCAST: Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
Posted: 24 Jul 2007 | Premiered: Jul 24, 2007

Dell Software

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona
26 - 33 of 33 Matches Previous Page    1 2    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement