IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management Security Reports
4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER: This white paper outlines four steps to developing a proactive data security and privacy approach that will help you keep big data safe without hindering your ability to capitalize on that data.
Posted: 21 Apr 2015 | Published: 18 Jun 2014


Building the Business Case for Modern Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: Discover the 4 questions you need to consider when building your IAM strategy to protect users, customers, third-parties, and sensitive data.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

Streamlining Security Identity Governance
sponsored by IBM
WHITE PAPER: Access this white paper to discover a business-centric approach to identity access and compliance that improves security and helps reduce costs for managing accounts, groups, credentials, and other access rights.
Posted: 26 Feb 2015 | Published: 26 Feb 2015


Key Considerations for Choosing Your Strong Authentication Strategy
sponsored by Imprivata
WHITE PAPER: This white paper presents the 7 forms of strong authentication and explores the benefits of each one. Continue reading to learn more about the factors to consider when choosing strong authentication and how to take your IAM strategy to the next level.
Posted: 24 Sep 2015 | Published: 28 May 2015


Utilizing Customer IAM to Better Enable and Protect Your Organization
sponsored by CA Technologies.
WHITE PAPER: This white paper explores customer identity and access management (CIAM) and how to enable and secure multiple channels of customer interaction.
Posted: 15 Jun 2015 | Published: 16 Jul 2014

CA Technologies.

Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation

Getting to know you
sponsored by
ANALYST REPORT: The pressing need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, say analysts Bob Tarzey and Rob Bamford.
Posted: 10 Aug 2015 | Published: 10 Aug 2015

The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
ESSENTIAL GUIDE: Access this essential guide to examine the security issues relating to Microsoft Azure and details Azures strengths in those areas.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Softchoice Corporation

Authenticating taxicab services
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

See clearly in the cloud with threat-aware identity and access management
sponsored by IBM
WHITE PAPER: View this white paper to learn how next-generation cloud security technologies can securely connect people, applications, and devices to cloud environments, eliminating data and application protection concerns.
Posted: 21 Mar 2015 | Published: 31 Oct 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement