IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management Security White Papers (View All Report Types)
 
Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM
WHITE PAPER: This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.
Posted: 22 Apr 2016 | Published: 01 Mar 2016

IBM

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

Why Your eCommerce Platform Needs CIAM
sponsored by Gigya
WHITE PAPER: While eCommerce platforms help enterprises build dynamic digital marketplaces, they aren't ideal for managing customer data. Discover how a specialized customer identity and access management platform can empower you to collect more customer data, build rich customer profiles, create personalized recommendations to drive conversions, and more.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

Gigya

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

IAM Beyond Traditional WAM
sponsored by Ping Identity Corporation
WHITE PAPER: Explore the 5 key attributes of API security in this exclusive white paper. Additionally, review the top 5 considerations for WAM migration and how to secure access to your IaaS/AWS environment.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

What You Need to Know About Vendor Risk Management in Financial Institutions
sponsored by BitSight
WHITE PAPER: This white paper discusses several proactive tips for better vendor risk management (VRM) practices that you can quickly put into place. Learn to overcome challenges faced within the financial industry for taking on VRM and how you can adopt these security secrets and keep pace with today's growing threat landscape as advanced threats persist.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

BitSight

Selecting a Privileged Identity Management Solution
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: There are a number of privileged identity management (PIM) solutions on the market today, but sifting through vendor hype quickly becomes laborious. This white paper provides and in-depth view of the leading PIM strategies and compares each to help you choose which approach is best for your organization.
Posted: 16 Mar 2016 | Published: 02 Mar 2016

Hitachi ID Systems, Inc.

Improve User Acquisition with Purpose-Built Customer Identity & Access Management
sponsored by Gigya
WHITE PAPER: Customizing pre-existing employee identity and access management systems for customer identities is a costly and risky process. Learn how a purpose-built customer identity and access management solution can help you securely manage millions of global user identities, maintain privacy compliance, and minimize IT maintenance.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

Gigya

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement