Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed    Add to Google    Add to My Yahoo!
ID Management White Papers (View All Report Types)
 
Hybrid Environments Demand Coordinated IAM for both Security and Agility
sponsored by Microsoft
WHITE PAPER: Access this resource to see the results of a Forrester Consulting report which reveals how organizations are using IAM in hybrid clouds and the benefits it can bring if handled with care.
Posted: 07 May 2015 | Published: 31 May 2014

Microsoft

Mainframe Security Entitlement Cleanup
sponsored by CA Technologies.
WHITE PAPER: In this paper, discover an approach that provides easily automated, virtually unattended and continuous cleanup of mainframe security files.
Posted: 26 Oct 2006 | Published: 01 Feb 2006

CA Technologies.

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives
sponsored by IBM
WHITE PAPER: When IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Using Microsoft Active Directory in the Domino World
sponsored by PistolStar, Inc.
WHITE PAPER: Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

PistolStar, Inc.

Enterprise Single Sign-On The Holy Grail of Computing
sponsored by Dell Software
WHITE PAPER: In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd

Provide Access Control With Innovative Solutions From IBM
sponsored by IBM
WHITE PAPER: Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Buyer’s Guide for Enterprise Single Sign-On
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance.
Posted: 25 Sep 2009 | Published: 01 Apr 2009

Oracle Corporation

Securing WLANs with Two-factor Authentication
sponsored by RSA
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement