Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software White Papers (View All Report Types)
1 - 25 of 85 Matches Previous Page  |  Next Page
Identity of Things: The Role of Identity Management in the IoT
sponsored by Amido
WHITE PAPER: Identity and Access Management (IAM) has become a core platform. According to IDG, 91% of IT Managers are seeing identity management as a key enabler for their digital business initiatives. Learn why IAM is evolving with the Internet of Things (IoT), and how to ensure your digital business is built on a firm foundation of identity.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Amido

Confidence to Innovate
sponsored by Dell India
WHITE PAPER: What are the benefits of complete visibility and control over your security environment? This resource explains the importance of connecting the 4 foundational functions of IT security to enable organizations to adapt rapidly to changing threats, regulations and new technologies.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Dell India

Gemalto Wades Deeper into IDaaS Waters with Adaptive Access Controls for Cloud Resources
sponsored by Gemalto
WHITE PAPER: Authentication and access controls typically present a tradeoff between security and convenience. This white paper keys into how Gemalto SafeNet offers 3 core functions each time a user attempts to access on-premises or cloud resources.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Gemalto

Single Sign-on for SAP Solution-based Environments
sponsored by One Identity
WHITE PAPER: Authentication Services from One Identity enables many non-Windows systems – including SAP solutions – to participate as "full citizens" in Active Directory, making SSO a reality. Take a look at this white paper to uncover security benefits provided by authentication services.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Extending Native Active Directory Capabilities to Unix and Linux
sponsored by One Identity
WHITE PAPER: As enterprises become more complex, involving multiple operating systems, the challenges of identity management also become greater. Take a closer look at this white paper to explore how you can simplify identity management across multiple operating systems.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Trusted Identities: Solving Fraud in Banking
sponsored by HID Global
WHITE PAPER: One of the biggest challenges facing banks today is how to provide secure and trusted services while substantially improving customer experience. Take a closer look at this white paper to reveal a holistic multi-channel identity and access management platform that can improve the user experience and create a higher level of mutual trust.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover why securing and managing privileged accounts should be an integral part of your organization's strategy in achieving SWIFT CSCF compliance.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

What's Trending in Authentication
sponsored by RSA
WHITE PAPER: Take a closer look at this white paper to reveal user authentication trends and discover how to protect your data from cyber criminals.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

RSA

As Learning Hinges On Devices And Applications, Challenges Increase For IT
sponsored by IBM
WHITE PAPER: Explore the importance of putting security measures in place to restrict apps, documents and data to specific users and groups, ensuring sensitive data does not end up in the wrong hands. Learn from the education industry on how endpoint management can help you achieve stronger data security.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

IBM

Advanced IAM for Endpoint and Mobile
sponsored by IBM
WHITE PAPER: Inside this white paper, learn how IAM can help simplify access to your cloud and mobile apps while increasing security.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

IBM

Unified Endpoint Management for All Device Types
sponsored by IBM
WHITE PAPER: Organizations are now on the hook to manage virtually every type of end-user device and many security risks come from a mixed-device environment. Inside this white paper, uncover how a unified endpoint management system can help your organization achieve the security and visibility it needs.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

IBM

A Tactical Guide to Finding the Right IDaaS Provider
sponsored by Simeio
WHITE PAPER: The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Simeio

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
WHITE PAPER: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

How to Achieve End-to-End Authentication
sponsored by iovation, Inc.
WHITE PAPER: Examine how to overcome top authentication challenges by adapting to different levels of risk in real time. Uncover how you can use this method to respond to different risk scenarios.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

iovation, Inc.

Making the Move to Dynamic Multifactor Authentication
sponsored by iovation, Inc.
WHITE PAPER: Passwords. The most hated thing we can't live without. Take a look at new advances in multifactor authentication that can create a more intuitive experience for the end user. Uncover how MFA works, the state of MFA adoption, and 5 reasons to move to a flexible MFA approach.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

iovation, Inc.

Dynamic Authentication
sponsored by iovation, Inc.
WHITE PAPER: It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

iovation, Inc.

How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016

OneLogin

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID Global
WHITE PAPER: Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID Global

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID Global

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 85 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement