IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed    Add to Google    Add to My Yahoo!
IM (Identity Management) White Papers (View All Report Types)
 
The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage, and learn how to automate SSH key management, compliance reporting, and more.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

The Economics of Digital Identity
sponsored by Oracle Corporation
WHITE PAPER: In this report, learn more about digital identities, the challenges organizations are facing, and strategies to clear those hurdles.
Posted: 30 Oct 2015 | Published: 01 Oct 2015

Oracle Corporation

Social Networking: 5 Risks of Team Login Sharing
sponsored by Dashlane Inc.
WHITE PAPER: Discover the 5 risks of team social networking login sharing and how to secure an always-on culture to connect with customers.
Posted: 17 Dec 2015 | Published: 09 Dec 2015

Dashlane Inc.

Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER: This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

Defending Against Advanced Threats at the Identity Perimeter
sponsored by SecureAuth
WHITE PAPER: This white paper explores how identity has become the new perimeter and the challenges that lie ahead.
Posted: 17 Jun 2015 | Published: 27 May 2015

SecureAuth

Detect and Thwart Insider Threats
sponsored by Lancope
WHITE PAPER: This white paper discusses how you can stop insider threats with enhanced network visibility. Read on to learn how to keep your organization secure from the inside out.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement