IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity ManagementWhite Papers (View All Report Types)
151 - 175 of 247 Matches Previous Page  | Next Page
Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Access Certification: Addressing and Building on a Critical Security Control
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
Posted: 21 Mar 2011 | Published: 01 Jan 2010

Oracle Corporation

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
sponsored by Oracle Corporation
WHITE PAPER: IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
Posted: 17 Mar 2011 | Published: 03 Jan 2011

Oracle Corporation

Evolve Your Sitemider Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration
sponsored by Radiant Logic, Inc.
WHITE PAPER: Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
Posted: 15 Mar 2011 | Published: 14 Mar 2011

Radiant Logic, Inc.

Choosing the Right Active Directory Bridge Solution
sponsored by Dell Software
WHITE PAPER: This Quest Software white paper helps you understand the questions to ask when choosing the best Active Directory solution for your company. Don’t waste any more time and money with systems that don’t play well together! Read this Quest white paper today.
Posted: 14 Feb 2011 | Published: 11 Feb 2011

Dell Software

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

IBM Point of View: Security and Cloud Computing
sponsored by IBM
WHITE PAPER: Cloud Computing is easy to deploy, flexible and cost-effective.  As federal agencies continue to outsource data management and operations to third-party cloud providers, their ability to ensure data integrity and privacy is becoming a potential security risk. Read this white paper to learn how you can manage Cloud Computing safely and efficiently.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Help Strengthen Security by Building a Trusted Identity Environment
sponsored by IBM
WHITE PAPER: As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Provide Access Control With Innovative Solutions From IBM
sponsored by IBM
WHITE PAPER: Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives
sponsored by IBM
WHITE PAPER: When IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Architectural Strategies for Cloud Computing
sponsored by Oracle Corporation
WHITE PAPER: This paper explains how cloud computing is now also evolving in a private variant whereby enterprises set up cloud-like, centralized shared infrastructure with automated capacity adjustment that internal departmental “customers” utilize in a self-service manner. Realization of efficiency, performance, and agility benefits is reinforcing this trend.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

Oracle Corporation

How can I Adopt Cloud Computing While Maintaining Strong Security?
sponsored by CA Technologies.
WHITE PAPER: Whether an organization is looking to provide or consume private, public, hybrid or community cloud services, security and control requirements must be addressed. Read this executive brief to learn how to secure your business in the cloud by using identity and access management.
Posted: 25 Nov 2010 | Published: 01 Sep 2010

CA Technologies.

How can Identity and Access Management Improve IT Security and Reduce Risk to Help Drive my Business?
sponsored by CA Technologies.
WHITE PAPER: IAM builds a foundation for effective security by helping ensure all users have only the appropriate level of access rights to all protected resources, and that those rights are enforced appropriately. Read this executive brief to learn more about taking control of IT operations and information security with Content-Aware IAM.
Posted: 25 Nov 2010 | Published: 01 Sep 2010

CA Technologies.

How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures?
sponsored by CA Technologies.
WHITE PAPER: Read this solution brief to learn how to improve control over systems, applications and information to reduce risk in both physical and virtual server environments.
Posted: 25 Nov 2010 | Published: 01 Sep 2010

CA Technologies.

Linking Identity and Data Loss Prevention to Avoid Damage to Brand, Reputation and Competitiveness
sponsored by CA Technologies.
WHITE PAPER: This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them.
Posted: 15 Oct 2010 | Published: 01 May 2010

CA Technologies.

Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how CA Technologies Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Posted: 01 Oct 2010 | Published: 01 Jun 2010

CA Technologies

Implementing Database Security and Auditing: Using Granular Access Control
sponsored by Guardium, an IBM Company
WHITE PAPER: In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Guardium, an IBM Company

Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage. 
Posted: 22 Sep 2010 | Published: 01 Jun 2010

CA Technologies.

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.

Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
sponsored by Dell Software
WHITE PAPER: Learn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
Posted: 26 Jul 2010 | Published: 26 Jul 2010

Dell Software

Develop Effective User Management to Demonstrate Compliance Efforts and Achieve Business Value
sponsored by IBM
WHITE PAPER: Learn how IBM solutions can help organizations support compliance efforts and business requirements through user management solutions based on IBM Tivoli Identity Manager software and other IBM offerings.
Posted: 16 Jun 2010 | Published: 19 Dec 2008

IBM

One Size Does Not Fit All: A Closer Look at Enterprise Application Integration Technology
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the driving forces that have made enterprise application integration so critical, reviews available integration approaches and outlines areas of consideration when selecting the best methodology for individual enterprise requirements. Read this paper to learn more.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

IntraLinks, Inc

ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

ArcSight, an HP Company
151 - 175 of 247 Matches Previous Page    5 6 7 8 9 10    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement