Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed    Add to Google    Add to My Yahoo!
ID Management Reports
 
Extended Enterprise Poses Identity and Access Management Challenges
sponsored by SearchSecurity.com
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
Posted: 26 Mar 2013 | Published: 26 Mar 2013

SearchSecurity.com

PhoneFactor Case Study: Fredrikson & Byron, P.A.
sponsored by PhoneFactor
CASE STUDY: Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

PhoneFactor

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure.
Posted: 17 Feb 2010 | Published: 12 Sep 2008

Hewlett-Packard Company

7 Key Reasons to Implement an Identity Aware Network
sponsored by Applied Identity
WHITE PAPER: This paper provides you with insight into the seven key reasons why internal networks are migrating towards an identity and role based infrastructure to provide a more effective and cost efficient method for securing critical business assets.
Posted: 26 Mar 2008 | Published: 01 Mar 2008

Applied Identity

Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how CA Technologies Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Posted: 01 Oct 2010 | Published: 01 Jun 2010

CA Technologies

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement