IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Management of Identity

RSS Feed    Add to Google    Add to My Yahoo!
Management of IdentityMultimedia (View All Report Types)
 
NEC Biometrics Solutions: Enhancing the Customer Experience and Securing Endpoints
sponsored by NEC Corporation of America
WEBCAST: This webcast reveals a biometrics solution that will help identify fraud across various industries.
Posted: 02 Oct 2014 | Premiered: Oct 1, 2014

NEC Corporation of America

What Your Enterprise Can Do to Optimize Provisioning Initiatives
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the crucial need to handle risk appropriately when dealing with access control.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Cloud and BYOD: So Happy Together
sponsored by SearchCloudComputing.com
VIRTUAL ENVIRONMENT: Getting cloud computing and mobile computing to coexist in ways that allow workers to be safely productive while not at their desks is a challenge. To succeed, IT admins must contend with device management, content management, file sharing in the cloud and security.
Posted: 30 Apr 2014 | Premiered: 08 May 2014

SearchCloudComputing.com

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012

Intel

Automating User Provisioning: A User’s Perspective
sponsored by Oracle Corporation
WEBCAST: Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.
Posted: 09 Mar 2011 | Premiered: Apr 12, 2011, 14:00 EDT (18:00 GMT)

Oracle Corporation

Three Key Areas for Improving your Compliance Programs
sponsored by CA Technologies.
PODCAST: This podcast focuses on the area of compliance, with a particular emphasis on the role of identity and access management in achieving compliance. It explores some of the key issues in compliance, and highlights techniques and best practices in identity and access management that can simplify and strengthen your compliance challenges.
Posted: 24 Nov 2010 | Premiered: Oct 21, 2010

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement