IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management (Security) White Papers (View All Report Types)
Self-Service Password Management: Taking the Burden off IT
sponsored by Imprivata
WHITE PAPER: This white paper explores enabling self-service password management for users and enhancing authentication security.
Posted: 22 Sep 2015 | Published: 05 May 2015


A Guide to Selecting the Best Authentication and Access Control for Your Enterprise
sponsored by SecureAuth
WHITE PAPER: Discover the 4 critical categories to consider when choosing an advanced authentication and access control strategy.
Posted: 13 Nov 2015 | Published: 28 Oct 2015


The Growing Need for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Access this white paper to reveal why you need FSSO in your IAM strategy to mitigate risk and vulnerabilities. View now to explore the buyer's guide checklist for choosing the ideal FSSO platform and the benefits to expect.
Posted: 25 Mar 2015 | Published: 05 Mar 2014


The Identity of Things (IDoT): Access Management (IAM) Reference Architecture for the Internet Of Things (IoT)
sponsored by ForgeRock
WHITE PAPER: This white paper describes how to apply identity services based on the underlying device architecture, as well as the native protocols and standards being used. Access now and discover which features play a significant role in applying identity services.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Provide Identity Integration Into Office 365 and Beyond
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper walks you through the challenges of identity integration and examines the strategies available to simplify the process.
Posted: 26 Oct 2015 | Published: 30 Sep 2015

Ping Identity Corporation

Concern for Accidental and Malicious Data Breaches for Data Stored in New Zealand
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on New Zealand and uncovered the fact that most New Zealanders were just as concerned about accidental security breaches as they were with malicious attacks. What other key concerns were there? Download today and find out the facts.
Posted: 29 Sep 2015 | Published: 31 Dec 2014


Healthcare eCredentials: Security, Mobility, Collaboration
sponsored by Citrix
WHITE PAPER: Discover how to empower healthcare professionals to connect with patients and perform critical processes and objectives regardless of location or device.
Posted: 10 Nov 2015 | Published: 31 Dec 2014


Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


5 Insider Tips for VPN Attack Protection
sponsored by SecureAuth
WHITE PAPER: This expert white paper examines the five tips to mitigating VPN breaches and protecting your data.  Read on to learn more.
Posted: 30 Mar 2015 | Published: 04 Mar 2015


Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement