Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed    Add to Google    Add to My Yahoo!
ID Management Reports
 
CW buyer’s guide: managing identity & access
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

How a German Utilities Company Embraced Secure Profile Management
sponsored by VMware
RESOURCE: This infographic shows how one German company overcame its cumbersome profile management practices, enhancing end-user experience and security in the process.
Posted: 06 May 2016 | Published: 31 Dec 2015

VMware

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com

Getting to know you
sponsored by ComputerWeekly.com
ANALYST REPORT: The pressing need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, say analysts Bob Tarzey and Rob Bamford.
Posted: 10 Aug 2015 | Published: 10 Aug 2015

ComputerWeekly.com

Forrester Report: The Total Economic Impact of Oracle Identity Manager
sponsored by Oracle Corporation
ANALYST REPORT: This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
Posted: 08 Apr 2011 | Published: 03 Nov 2008

Oracle Corporation

Handbook: Identity and Access Management
sponsored by SearchSecurity.com
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT: In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013

SailPoint Technologies

Provide Access Control With Innovative Solutions From IBM
sponsored by IBM
WHITE PAPER: Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

The Total Economic Impact of CA Identity Manager
sponsored by CA Technologies.
WHITE PAPER: In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found.
Posted: 02 Mar 2010 | Published: 19 Feb 2010

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement