IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity ManagementWhite Papers (View All Report Types)
1 - 25 of 242 Matches Previous Page  | Next Page
Mitigating Web Security Risk with SSL Certificates: Benefits and Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This white paper highlights several benefits and best practices when using Secure Sockets Layer (SSL) applications to authenticate users, applications and Web services.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER: Discover the importance of implementing a strong authentication method for protection purposes.
Posted: 31 Jul 2014 | Published: 20 Mar 2014

HID

Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: This white paper introduces a solution that helps financial institutions mitigate the risks of even the most sophisticated malware.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

One Time Passwords for Mobile Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how more financial institutions are adopting mobile authentication for on line banking and deploying mobile platforms.
Posted: 24 Jul 2014 | Published: 07 Apr 2014

HID

ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
WHITE PAPER: Discover several security risks of typical enterprise and government PKIs and why higher assurance solutions are vital for security purposes.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Thales Solution for Microsoft Active Directory Certificate Services
sponsored by Thales
WHITE PAPER: Access a seamless solution that issues, manages, and validates digital identities that are used to verify an individual or a system.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Providing a single source for secure identity solutions
sponsored by HID
WHITE PAPER: Access this white paper to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012

HID

HID Global’s Identity Assurance SMB Solution
sponsored by HID
WHITE PAPER: In this resource, explore how a strong authentication method is possible without tokens or any complexity.
Posted: 10 Jul 2014 | Published: 03 May 2013

HID

Establishing Trust in Online Identities
sponsored by HID
WHITE PAPER: Access this white paper to discover strong authentication and credential management solutions and services.
Posted: 09 Jul 2014 | Published: 04 Dec 2012

HID

Enterprise Universal Access One secure credential for logical, physical, local and remote access
sponsored by HID
WHITE PAPER: This white paper explores leading solutions designed to create successful enterprise authentication.
Posted: 09 Jul 2014 | Published: 19 Sep 2013

HID

Enabling a secure and convenient online banking experience
sponsored by HID
WHITE PAPER: In this white paper, discover security solutions that are scalable, secure and simple to implement for online banking.
Posted: 09 Jul 2014 | Published: 03 May 2013

HID

Authentication Devices - User-friendly authenticators for every use case
sponsored by HID
WHITE PAPER: In this white paper, access over 10 different authentication devices from a reliable provider to achieve the strength and security you strive for.
Posted: 09 Jul 2014 | Published: 09 Jul 2012

HID

ActivID® Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: In this white paper, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

Identity Management Tool: Scalability Test Results & Analysis
sponsored by CA Technologies.
WHITE PAPER: For many organizations, it's never been more important to have an identity management strategy that can scale to support increasing and decreasing numbers of users. In this white paper, explore the performance test results of one identity management tool for user populations of up to 100 million
Posted: 24 Jun 2014 | Published: 31 Jan 2014

CA Technologies.

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

Only Bitglass Secures Cloud And Mobile Yet Respects User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Move Forward With Mobile and Cloud, Securely
sponsored by BitGlass
WHITE PAPER: This resource highlights 5 critical characteristics to have in a unified security solution that will protect mobility and cloud initiatives.
Posted: 19 Jun 2014 | Published: 19 Jun 2014


Leveraging Privileged Identity Governance to Improve Security Posture
sponsored by CA Technologies.
WHITE PAPER: This exclusive resource takes an in-depth look at insider attacks, and discusses how privileged identity governance can help you identify and deal with potential threats from within your own environment.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

CA Technologies.
1 - 25 of 242 Matches Previous Page    1 2 3 4    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement