IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management Security

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management Security Reports
 
Improve User Acquisition with Customer Identity & Access Management
sponsored by Gigya
WHITE PAPER: In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

Gigya

A Computer Weekly Buyer's Guide to Access Control
sponsored by ComputerWeekly.com
EBOOK: In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.
Posted: 29 Apr 2016 | Published: 03 May 2016

ComputerWeekly.com

How IT Leaders Are Innovating with Customer Identity Management
sponsored by Gigya
WHITE PAPER: With IT budgets limited, enterprises often struggle to secure funds for innovations that enable crucial relationships with customers. Access this white paper that explains how a separate customer identity management layer can help you attract customers while maximizing budget and ROI.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

Gigya

Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

Building, Installing, and Configuring a RADIUS Server
sponsored by Global Knowledge
WHITE PAPER: A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Global Knowledge

Cost-Effectively License Enterprise Mobility Cloud Services for All Your Users
sponsored by Microsoft
DATA SHEET: A cloud-based enterprise mobility suite (EMS) provides users access to the unified experience that they have come to expect. Inside, learn how an EMS boosts productivity, mobile management, and security measures.
Posted: 29 Aug 2016 | Published: 31 Dec 2014

Microsoft

Leverage Accurate and Current Customer Data with Social Login
sponsored by Gigya
WHITE PAPER: To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.
Posted: 21 Mar 2016 | Published: 16 Sep 2015

Gigya

3 Types of Insider Threats to Watch Out For
sponsored by Absolute
WHITE PAPER: Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Absolute

What’s New in the Windows 10 Security Log
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, take a look at the new and updated event entries in Windows 10 and learn how to leverage them to identify malicious activity. Continue reading to uncover the specific auditing and logging events recently added by Microsoft and how to turn data into insights.
Posted: 07 Mar 2016 | Published: 27 Jan 2016

LogRhythm, Inc.

When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016

Unisys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement