IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed    Add to Google    Add to My Yahoo!
User ID Management Multimedia (View All Report Types)
Is Identity Governance Automation Necessary?
sponsored by RSA
SOFTWARE DOWNLOAD: This free download allows you to try RSA's access governance platform to see if it delivers the benefits it promises.
Posted: 01 Oct 2015 | Premiered: 02 Sep 2015


Can Directory Services Simplify AD Management?
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive expert webcast, you'll learn more about the identity challenges associated with Active Directory. View now to uncover the steps your organization needs to take to strengthen you IAM strategy and improve overall security.
Posted: 10 Sep 2015 | Premiered: Aug 26, 2015

Radiant Logic, Inc.

Stopping Data Breaches with Smarter Multi-factor Authentication
sponsored by Okta
WEBCAST: This webinar explores the current authentication trends and why strong authentication isn't as viable and smart of a choice as it seems.
Posted: 23 Sep 2015 | Premiered: Sep 18, 2015


Healthcare Data Security Compliance: Digital Identity Protection
sponsored by VASCO Data Security International
WEBCAST: This webcast highlights a collection of authentication strategies for healthcare organizations to overcome their most pressing security challenges. View now to learn how to build a robust IAM and strong authentication foundation.
Posted: 25 Aug 2015 | Premiered: Aug 5, 2015

VASCO Data Security International

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Automating User Provisioning: A User’s Perspective
sponsored by Oracle Corporation
WEBCAST: Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.
Posted: 09 Mar 2011 | Premiered: Apr 12, 2011, 14:00 EDT (18:00 GMT)

Oracle Corporation

Secure Cloud Access Reference Architecture Model
sponsored by Intel
WEBCAST: Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.
Posted: 10 May 2011 | Premiered: May 10, 2011


Mitigating Insider Threats
sponsored by IBM
WEBCAST: This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
Posted: 14 Aug 2013 | Premiered: Aug 14, 2013


Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012


Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement