IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Management of Identity

RSS Feed    Add to Google    Add to My Yahoo!
Management of Identity White Papers (View All Report Types)
 
Cloud IAM Goes Beyond SSO
sponsored by SailPoint Technologies
WHITE PAPER: With the adoption of cloud IAM on the rise, managing the user's journey, access control, and governance functionality is mandatory. This paper offers 4 challenges that drive cloud IAM adoption and provides invaluable information on cloud access with single-sign-on, access governance and cloud IAM features.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

5 Signs You Need to Upgrade Your Legacy IA M System
sponsored by Identity Automation
WHITE PAPER: While 49% of business applications are now stored in the cloud, less than half of them are known or approved by the IT department, according to Ponemon Institute. This white paper reveals 5 signs you need to update your legacy identity and access management system.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

3 Types of Rogue Employees and How to Stop Them
sponsored by Identity Automation
WHITE PAPER: Employees pose the greatest threat to any organization and have the capability to cause egregious harm and costs through data breaches, insecure transactions, and cyber theft. This e-book reveals 3 types of employees who pose security risks and offers strategic approaches utilizing IAM for mitigating these risks and improving your security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID Global
WHITE PAPER: Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID Global

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement