IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed    Add to Google    Add to My Yahoo!
User Provisioning White Papers (View All Report Types)
Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014


Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Buyer's Guide: Select the Right Solution for Identity and Access Assurance
sponsored by IBM
WHITE PAPER: Consult this buyer's guide to help you select the right technology for identity and access assurance -- one that will control access within, across, and between businesses.
Posted: 06 May 2014 | Published: 30 Apr 2013


Enhanced Access Control for the Healthcare Industry
sponsored by Imprivata
WHITE PAPER: This report takes a look at security designed for healthcare, discussing what single sign-on, virtual desktop access and more looks like when it complies with healthcare needs.
Posted: 25 Sep 2015 | Published: 31 Mar 2015


Transform and Protect your Customers' Mobile Moments with Seamless Authentication
sponsored by Okta
WHITE PAPER: In this white paper, you will learn the 8 characteristicsthat users look for when evaluating mobile authentication and how to secure data while providing a positive customer experience.
Posted: 28 Sep 2015 | Published: 17 Sep 2014


Protect Your SSH Keys from Misuse
sponsored by Venafi
WHITE PAPER: This white paper discusses how you can enhance enterprise security with SSH monitoring and policy enforcement.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Centricity™ Cardio Enterprise Solution for the Echo Lab
sponsored by GE Healthcare
WHITE PAPER: Centricity Cardio Enterprise solution for the Echo Lab empowers cardiologists to help enhance patient care through full clinical access, optimized productivity, and improved revenue cycle efficiencies. Read this white paper to learn more about this single point of access to unified patient data, images, and reports.
Posted: 04 May 2015 | Published: 04 May 2015

GE Healthcare

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012


Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement