IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management Security Reports
 
The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage, and learn how to automate SSH key management, compliance reporting, and more.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Puppet: The Good, Bad, and Ugly for Configuration Management & Security
sponsored by FoxT
WHITE PAPER: This white paper talks you through the strengths and vulnerabilities of running Puppet in your organization for IAM and steps to take to improve security. Read on to learn how to scale Puppet with your user base and keep employees secure.
Posted: 05 Jan 2016 | Published: 02 Dec 2015

FoxT

The Economics of Digital Identity
sponsored by Oracle Corporation
WHITE PAPER: In this report, learn more about digital identities, the challenges organizations are facing, and strategies to clear those hurdles.
Posted: 30 Oct 2015 | Published: 01 Oct 2015

Oracle Corporation

OPM Breach: Why Security Needs to be a Priority
sponsored by FoxT
WHITE PAPER: Learn more about the political battle security teams are losing and why root access requirements leave your organization open to an IAM hack in this white paper. Find out how to granularly manage access accounts and control privileges across diverse operating systems.
Posted: 04 Jan 2016 | Published: 23 Dec 2015

FoxT

Managing the Secure Deployment of Cloud Services
sponsored by IBM
WHITE PAPER: This white paper invites you to explore the possibilities of a SaaS-based approach to the secure deployment and use of cloud services. Access now and learn how to make it easier for business users to access sanctioned cloud services and introduce elements of identity and access management (IAM) that are often missing.
Posted: 22 Dec 2015 | Published: 27 Oct 2015

IBM

Advanced Session Security
sponsored by CA Technologies
WHITE PAPER: Surveys show that IT security experts have identified session hijacking as one of the top three security risks. Access this white paper and uncover details on two highly successful methods for enhancing session security.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

CA Technologies

Leading Global Manufacturing Company Streamlines Administration with Centralized Privileged User Management
sponsored by FoxT
CASE STUDY: This case study examines how one manufacturing company was able to simplify their compliance and administration with network security and access management software. Read on to see how this centralized solution can enable your enterprise to automatically authorize user access, streamline your operations, and closes security gaps.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

FoxT

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

Your Guide to Zen and the Art of Delivering Identity Federation
sponsored by Radiant Logic, Inc.
EBOOK: In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement