IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity Management White Papers (View All Report Types)
1 - 25 of 254 Matches Previous Page  |  Next Page
Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Gain Complete Control of Your Digital Ecosystem
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

For Better Access Governance, Look Beyond Roles to
sponsored by IBM
WHITE PAPER: Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Tolly Test Report: Evaluating a Web Protection Vendor
sponsored by IBM
WHITE PAPER: In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

KuppingerCole Report: Access Management and Federation
sponsored by IBM
WHITE PAPER: Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.
Posted: 26 Aug 2016 | Published: 31 Mar 2016

IBM

The Power of Modern Access Management Tools
sponsored by IBM
WHITE PAPER: Find out how you can take back control of access management with an integrated platform for web, mobile & cloud in this white paper.
Posted: 26 Aug 2016 | Published: 30 Sep 2015

IBM

Take Back Control of Access Management
sponsored by IBM
WHITE PAPER: An integrated approach to access management can reduce complexity and thwart security breaches. Access this white paper to learn about the myriad benefits all-in-one access management technology can offer.
Posted: 26 Aug 2016 | Published: 30 Sep 2015

IBM

85% of Customers are Dissatisfied with the Authentication Process
sponsored by NICE Systems, Inc
WHITE PAPER: This infographic reveals what you can do to reduce the burden of authentication for your customers. Learn how to prevent fraud in your contact center, while minimizing interrogation and saving money on every call.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

NICE Systems, Inc

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

An Operational Model for Breach Analytics and Intelligence
sponsored by Anomali
WHITE PAPER: In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.
Posted: 06 Jun 2016 | Published: 01 May 2016

Anomali

The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER: In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

vanGO® One-2-One™ Personalized Security
sponsored by HID
WHITE PAPER: With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

Build a common identity profile and hub out of disparate identity sources
sponsored by Radiant Logic, Inc.
WHITE PAPER: Discover how to renew your existing IAM investments, making them a strategic infrastructure solution that supports current identity needs and adapts quickly to future requirements as they arise.
Posted: 02 Jun 2016 | Published: 01 May 2016

Radiant Logic, Inc.

Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

IBM

How IT Leaders Are Innovating with Customer Identity Management
sponsored by Gigya
WHITE PAPER: With IT budgets limited, enterprises often struggle to secure funds for innovations that enable crucial relationships with customers. Access this white paper that explains how a separate customer identity management layer can help you attract customers while maximizing budget and ROI.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

Gigya

Improve User Acquisition with Customer Identity & Access Management
sponsored by Gigya
WHITE PAPER: In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

Gigya

A Buyer's Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 05 Apr 2016 | Published: 31 Dec 2014

Radiant Logic, Inc.

Faster Authentication, Smarter Authorization, and a Common Identity for WAM and Federation
sponsored by Radiant Logic, Inc.
WHITE PAPER: Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.
Posted: 04 Apr 2016 | Published: 31 Dec 2015

Radiant Logic, Inc.

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.
Posted: 01 Apr 2016 | Published: 31 Dec 2013

Radiant Logic, Inc.

The Key to Secure and Seamless Access to Web and Cloud Applications
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 01 Apr 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 254 Matches Previous Page    1 2 3 4    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement