IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

IAM

RSS Feed    Add to Google    Add to My Yahoo!
IAM Reports
 
IAM: The New Security Perimeter
sponsored by IBM
WHITE PAPER: Access this white paper to explore how IAM platforms reduce risk and keep unknown users and hackers out of your network.
Posted: 25 Mar 2015 | Published: 05 Nov 2013

IBM

Tackling Print Security in 2015: Manage Hidden Risks
sponsored by Hewlett-Packard Company
VIRTUAL ENVIRONMENT: Access this classroom to learn how you can manage hidden risks that accompany printers in the enterprise.
Posted: 05 Mar 2015 | Premiered: 03 Mar 2015

Hewlett-Packard Company

Secure by Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

How to Manage Privileged Access in the Enterprise
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper covers five key tips for managing privileged access in the enterprise.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: This white paper features an automated identity and access management (IAM) solution that accommodates physical and cloud environment users to ensure that the right people have the right access to virtualized resources and applications.
Posted: 05 Mar 2014 | Published: 31 Dec 2011

IBM

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Evolve SiteMinder With RadiantOne
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments.
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
IAM White Papers | IAM Multimedia | IAM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement