IT Systems  >   Business Systems  >   Security Systems  >  

Identification Systems

RSS Feed    Add to Google    Add to My Yahoo!
Identification Systems Reports
1 - 25 of 37 Matches Previous Page  |  Next Page
Expert Viewpoints on Access Management and Federation
sponsored by IBM
WHITE PAPER: Learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

Simplify and Accelerate Identity Protection on The Cloud
sponsored by IBM
WHITE PAPER: Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM.
Posted: 10 Feb 2017 | Published: 30 Jun 2015

IBM

How to Strengthen Your Identity Infrastructure
sponsored by ExtraHop
WHITE PAPER: Few things are as essential to organizational health as identity infrastructure, which has greatly increased in importance because of new service models. Learn how to cut complexity and regain control of IT services, including identity systems, by unlocking the hidden value in data flowing through your network.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

ExtraHop

Moving from Simple Authentication to Identity Assurance
sponsored by RSA
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

RSA

A New Paradigm for Identity Assurance
sponsored by RSA
WHITE PAPER: Learn how to take authentication to the next level. Discover how to determine the risk associated with the action a user is about to take, based on context gathered over time, continuously.
Posted: 30 Jan 2017 | Published: 31 Dec 2016

RSA

State of PAM 2016
sponsored by Thycotic
ANALYST REPORT: In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Thycotic

Digital identities and the open business
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

ComputerWeekly.com

Best Practices for Managing and Understanding Mobile Authentication
sponsored by SearchSecurity.com
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SearchSecurity.com

WLAN Access Control and Wi-Fi Network Needs
sponsored by SearchSecurity.com
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

SearchSecurity.com

Crafting an Identity-Based Security Strategy for Cloud
sponsored by Hewlett Packard Enterprise
EGUIDE: IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Hewlett Packard Enterprise

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

How to Craft SSO and IAM Strategies on the Cloud
sponsored by OneLogin
EGUIDE: Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.
Posted: 11 Jul 2016 | Published: 05 Jul 2016

OneLogin

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM

Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: This guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Celestix Networks

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013

RSA

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Presentation Transcript: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PRESENTATION TRANSCRIPT: This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

Aveksa
1 - 25 of 37 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement