IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity ManagementWhite Papers (View All Report Types)
76 - 100 of 219 Matches Previous Page  | Next Page
Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

SAML 101 White Paper
sponsored by Ping Identity Corporation
WHITE PAPER: Read this whitepaper to learn how identity federation has helped provide a secure, private mechanism for organizations to share user identities. And discover how this solution can help you enhance security, limit risk and improve compliance by eliminating Web application passwords.
Posted: 04 Mar 2013 | Published: 31 Dec 2012

Ping Identity Corporation

IDC white paper: Better Identity and Access Management in the Age of Cloud Computing
sponsored by Ping Identity Corporation
WHITE PAPER: In this Q&A session, get the answers to your top identity and access management questions to learn how to achieve better IAM in the age of cloud computing.
Posted: 27 Feb 2013 | Published: 31 Aug 2012

Ping Identity Corporation

Cisco Unified Access Technology Overview: Converged Access
sponsored by Cisco
WHITE PAPER: Read this white paper to learn about a strategy that could help you manage the growth of mobile devices and traffic effectively, as well as make your business faster, more efficient, and more connected than ever before.
Posted: 11 Feb 2013 | Published: 11 Jan 2013

Cisco

Rethinking your Enterprise Security: Critical Priorities to Consider
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, explore a sustainable approach to security designed to address the latest generation of vulnerabilities spawned from today's IT trends. Read on to access four keys to establish end-to-end security and five critical security priorities you must be aware of.
Posted: 28 Sep 2012 | Published: 31 May 2012

Hewlett-Packard Limited

The Importance of Managing Privileged Accounts
sponsored by Dell Software
WHITE PAPER: In this Windows IT Pro white paper sponsored by Dell, gain a deeper understanding of the dangers and benefits of privileged accounts. Discover why effectively managing privileged accounts is more important than ever, and how you can mitigate risks by enabling granular access control and accountability for privileged accounts. Read it today.
Posted: 02 Jul 2012 | Published: 29 Jun 2012

Dell Software

Safeguard your organization from Red Flags Rule non compliance
sponsored by Iron Mountain
WHITE PAPER: Since the Red Flags Rule took effect in 2011, there has been a lot of confusion over which businesses must comply and develop identity theft prevention programs. Is your business covered? This paper clearly defines which businesses are affected, explains the key aspects of the Red Flags Rule and more.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Intelligent Authentication and User Access: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This informative white paper outlines today's rapidly changing security landscape,  and offers an overview of the latest identity and access security strategies so that your organization can stay safe - click through to learn more.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

CA Technologies.

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Limited
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Limited

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

The Consumerization of IT: Security Challenges of the New World Order
sponsored by CA Technologies.
WHITE PAPER: Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them.
Posted: 22 Aug 2012 | Published: 31 May 2012

CA Technologies.

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues.
Posted: 21 Aug 2012 | Published: 31 Jan 2012

Juniper Networks, Inc.

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

PortalGuard

Cloud Encryption Gateway: Overcoming Cloud Security and Compliance Concerns
sponsored by CipherCloud
WHITE PAPER: Learn how CipherCloud protects data in Salesforce, Gmail, and Office 365. Find out how the solution sits between your users and your cloud applications and applies AES-256 encryption on the fly before sensitive data leaves the enterprise to provide protection without requiring changes to the cloud application or impacting application functionality.
Posted: 09 Aug 2012 | Published: 09 Aug 2012

CipherCloud

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa

5 Cloud Security Concerns You Must Address
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy.
Posted: 26 Jul 2012 | Published: 01 May 2012

Hewlett-Packard Company

Interpol, Entrust Develop Advanced Multipurpose SmartCard
sponsored by Entrust, Inc.
WHITE PAPER: See how in this real world case study the power of advanced enterprise security was harnessed to create the most advanced multipurpose credentials in the world for INTERPOL.
Posted: 25 Jul 2012 | Published: 30 Nov 2011

Entrust, Inc.

Protect citizen data with IBM Rational software
sponsored by IBM
WHITE PAPER: Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

IBM

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

The Threat Within: The Case for Zero Trust Access Control
sponsored by Xceedium
WHITE PAPER: It's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.
Posted: 22 May 2012 | Published: 22 May 2012

Xceedium

Enterprise Single Sign On
sponsored by tools4ever
WHITE PAPER: With organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.
Posted: 18 May 2012 | Published: 17 May 2012

tools4ever

How Can Content-Aware Identity and Access Management Give Me the Control I Need to Confidently Move My Business forward?
sponsored by CA Technologies.
WHITE PAPER: Organization's today have their hands full trying to adhere to regulatory requirements and reduce IT risks, all while looking for innovative ways to grow their business. This paper uncovers how to gain continuous and sustainable control and compliance though IAM, while strengthening the trust and satisfaction of your customers and partners.
Posted: 16 May 2012 | Published: 01 Feb 2012

CA Technologies.

How Can I Virtualize My Mission-critical Servers While Maintaining or Improving Security?
sponsored by CA Technologies.
WHITE PAPER: Organizations often struggle to fully realize the benefits of virtualization due to the complexity of controlling identities, access and information. In this resource, uncover how to successfully deploy virtualization projects, while providing the right security controls over privileged user access across virtual and physical environments.
Posted: 15 May 2012 | Published: 15 May 2012

CA Technologies.

The Role of Identity & Access Management in Achieving Continuous Compliance
sponsored by CA Technologies.
WHITE PAPER: A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform.
Posted: 14 May 2012 | Published: 01 Feb 2012

CA Technologies.

7 Tips for Achieving Active Directory Compliance
sponsored by Dell Software
WHITE PAPER: Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Dell Software
76 - 100 of 219 Matches Previous Page    2 3 4 5 6 7    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement