IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management (Security)Reports
 
Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security
sponsored by Imprivata
WHITE PAPER: This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs.
Posted: 08 Apr 2014 | Published: 28 Feb 2014

Imprivata

ActivID® Threat Detection Service
sponsored by HID
DATA SHEET: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-in 2014 Vendor Assessment
sponsored by CA Technologies.
ASSESSMENT TOOL: Explore this study conducted by IDC that compares vendors in the IAM market, particularly catering to FSSO programs.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

CA Technologies.

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

ActivID® Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: In this white paper, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Who, What, Where? How the Cloud Complicates Identity Management
sponsored by SearchExchange.com
EBOOK: In the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

SearchExchange.com

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement