Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed    Add to Google    Add to My Yahoo!
ID Management Reports
 
The identity perimeter
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth, make the case for identity management and advanced single-sign-on (SSO) to help businesses and their customers and partners work in a more integrated way.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

Authenticating taxicab services
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

CW buyer’s guide: managing identity & access
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Digital identities and the open business
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

ComputerWeekly.com

Integrating Unix and Linux Systems with Active Directory
sponsored by Dell Software
TECHNICAL ARTICLE: Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Intelligent Authentication and User Access Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.
Posted: 12 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Identity Management: The Foundation for PCI, SOX, and HIPAA Compliance
sponsored by Watson SCS, Inc.
WHITE PAPER: This paper discusses the inner-workings of an identity management solution and how it relates to SOX, PCI and HIPAA compliance.
Posted: 01 Dec 2007 | Published: 01 Nov 2007

Watson SCS, Inc.

Information Security Magazine - April 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

SearchSecurity.com

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT: In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013

SailPoint Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement