IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed    Add to Google    Add to My Yahoo!
User Provisioning White Papers (View All Report Types)
 
Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Case Study: How a Leading Bank Monitors All Its Data
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank gained the ability to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Secure Access between Endpoints and Corporate Resources
sponsored by HID
WHITE PAPER: This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token. Read on to learn how to manage your authentication methods, protect your data, maximize your productivity, and more.
Posted: 30 Jun 2015 | Published: 20 Feb 2013

HID

Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER: This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014

HID

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

IAM - The Foundation of Cloud Security
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper examines key components for an effective IAM program to protect your sensitive data from unauthorized access.
Posted: 08 May 2015 | Published: 11 Dec 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement