Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed    Add to Google    Add to My Yahoo!
ID Management Reports
Baffled by managing digital identity?
sponsored by
RESOURCE: Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

6 Criterions for Strong Authentication
sponsored by HID
WHITE PAPER: This white paper presents a 6-step plan to ensure stronger authentication to go beyond basic password methods. Continue reading to learn how to craft a robust authentication strategy without sacrificing user convenience.
Posted: 22 Jul 2015 | Published: 07 Jan 2015


Securing WLANs with Two-factor Authentication
sponsored by RSA
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007


On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck
sponsored by Dell Software
WEBCAST: Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
Posted: 24 Jul 2007 | Premiered: Jul 24, 2007

Dell Software

Identity Management: The Foundation for PCI, SOX, and HIPAA Compliance
sponsored by Watson SCS, Inc.
WHITE PAPER: This paper discusses the inner-workings of an identity management solution and how it relates to SOX, PCI and HIPAA compliance.
Posted: 01 Dec 2007 | Published: 01 Nov 2007

Watson SCS, Inc.

Integrating Unix and Linux Systems with Active Directory
sponsored by Dell Software
TECHNICAL ARTICLE: Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Privilege Made Simple: Privilege Identity Management (PIM) Demystified
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more.
Posted: 29 Mar 2010 | Published: 26 Mar 2010

BeyondTrust Corporation

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning
sponsored by Security Weaver
WHITE PAPER: For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions.
Posted: 24 Sep 2008 | Published: 24 Sep 2008

Security Weaver

Identity Management: Implementation And System Support
sponsored by OpenIAM
EGUIDE: In this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement