IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

IAM

RSS Feed    Add to Google    Add to My Yahoo!
IAM Reports
 
Lighting a Path to PCI Compliance
sponsored by Illumio
WHITE PAPER: Adaptive Security Platforms (ASP) can ensure PCI compliance and audit preparation across a wide spectrum of standards. Read on to uncover how your enterprise can protect cardholder data, implement strong access control measures, maintain an information security policy, and more.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Illumio

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: With much of today's successfully executed breaches involving privileged users or credentials, mitigating risk has never been more pressing. Learn how meeting the requirements of Payment Card Industry Data Security Standard version 3 can lead to victory over privileged access violators.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Leverage Accurate and Current Customer Data with Social Login
sponsored by Gigya
WHITE PAPER: To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.
Posted: 21 Mar 2016 | Published: 16 Sep 2015

Gigya

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

ID and Access Management for Microsoft Applications
sponsored by HID
WHITE PAPER: Discover how you can prevent irreparable damage to your company from unauthorized users with real-time authentication. Learn how you can ensure your data is protected, and grant access to authorized users with the tap of a card for Microsoft applications on your desktop, tablet, or mobile device.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

HID

MobileIron Named a Leader in Enterprise Mobile Management Report
sponsored by MobileIron
RESOURCE: Find out how the top 11 enterprise mobile management (EMM) vendors stack up against each other when compared against an expert 25-criteria evalutaion.
Posted: 02 Jun 2016 | Published: 04 Dec 2015

MobileIron

Benefits & Regulatory Requirements of Electronic Prescribing of Controlled Substances
sponsored by Imprivata
WEBCAST: In this brief webcast, examine the technology and personnel requirements necessary to enable Electronic Prescription of Controlled Substances (ECPS).
Posted: 08 Jun 2015 | Premiered: Dec 3, 2014

Imprivata

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Privileged access, accounts and credentials are critical assets for enterprises that must be highly protected through a defense-in-depth strategy. Discover ways to combine technology and processes so you can prevent data breaches, address regulatory requirements, and more.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

An Operational Model for Breach Analytics and Intelligence
sponsored by Anomali
WHITE PAPER: In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.
Posted: 06 Jun 2016 | Published: 01 May 2016

Anomali
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
IAM White Papers | IAM Multimedia | IAM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement