IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management Security White Papers (View All Report Types)
 
A Solution for Managing Privileged Access
sponsored by Devolutions
WHITE PAPER: For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Devolutions

IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

One Identity

Magic Quadrant for Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: Security and risk management leaders responsible for IAM should be aware of functional differences between on-premises and cloud-delivered identity governance and administration (IGA). This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's IGA products as well as, a market overview.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Confidence to Innovate
sponsored by Dell India
WHITE PAPER: What are the benefits of complete visibility and control over your security environment? This resource explains the importance of connecting the 4 foundational functions of IT security to enable organizations to adapt rapidly to changing threats, regulations and new technologies.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Dell India

The Sharing Economy: Who Will You Trust
sponsored by Evident
WHITE PAPER: With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Evident

Pick Your Identity Bridge
sponsored by Ping Identity Corporation
WHITE PAPER: This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
Posted: 10 Mar 2014 | Published: 01 Jan 2014

Ping Identity Corporation

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement