Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software White Papers (View All Report Types)
1 - 25 of 80 Matches Previous Page  |  Next Page
A Tactical Guide to Finding the Right IDaaS Provider
sponsored by Simeio
WHITE PAPER: The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This guide can answer some of your top questions about how to choose the right IDaaS provider for your organization.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Simeio

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID
WHITE PAPER: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID

Protecting the Keys to Your Kingdom
sponsored by Thycotic
WHITE PAPER: In this white paper, take an in-depth dive into privileged account management in order to ensure that employees only have the permissions they need for the job – not ones that make you vulnerable.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Thycotic

Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences
sponsored by NICE Systems, Inc
WHITE PAPER: Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

5 Strategies to Improve Your Security Posture
sponsored by Citrix
WHITE PAPER: Reducing business security risk, protecting sensitive customer data, and ensuring compliance with regulations and standards are priorities for all organizations. Explore 5 ways you can overcome these security challenges.
Posted: 02 Aug 2017 | Published: 31 Dec 2016

Citrix

How to Achieve End-to-End Authentication
sponsored by iovation, Inc.
WHITE PAPER: Examine how to overcome top authentication challenges by adapting to different levels of risk in real time. Uncover how you can use this method to respond to different risk scenarios.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

iovation, Inc.

Making the Move to Dynamic Multifactor Authentication
sponsored by iovation, Inc.
WHITE PAPER: Passwords. The most hated thing we can't live without. Take a look at new advances in multifactor authentication that can create a more intuitive experience for the end user. Uncover how MFA works, the state of MFA adoption, and 5 reasons to move to a flexible MFA approach.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

iovation, Inc.

Dynamic Authentication
sponsored by iovation, Inc.
WHITE PAPER: It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

iovation, Inc.

How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016

OneLogin

Identify, Connect, and Protect Mobile and IoT at the Edge
sponsored by Aruba Networks
WHITE PAPER: Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Aruba Networks

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation

6 Risks and Opportunities to Strengthen Security using IaaS
sponsored by Centrify Corporation
WHITE PAPER: The idea of a secure perimeter has moved beyond the data center. Organizations must create the secure perimeter around the users and their devices. Examine six common risks of the modern "perimeter-less" network, and uncover six opportunities to strengthen security using IaaS.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID
WHITE PAPER: Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

Building the Business Case for Strong Authentication
sponsored by HID
WHITE PAPER: With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID

85% of Customers are Dissatisfied with the Authentication Process
sponsored by NICE Systems, Inc
WHITE PAPER: This infographic reveals what you can do to reduce the burden of authentication for your customers. Learn how to prevent fraud in your contact center, while minimizing interrogation and saving money on every call.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

NICE Systems, Inc

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

IAM Buyers Guide: How to Evaluate and Choose the Right Platform
sponsored by IBM
WHITE PAPER: Access this resource and explore the IAM buyer's guide.  Discover how to evaluate and choose a solution to protect your organization's data
Posted: 25 Feb 2015 | Published: 11 Jun 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
1 - 25 of 80 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement