Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software Reports
1 - 25 of 127 Matches Previous Page  |  Next Page
Designing a Multilayered, In-Depth Defense Approach to Authentication
sponsored by Dell Software
WHITE PAPER: This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Uncover features you should look for in third-party solutions to supplement native security mechanisms.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

Root Out Ransomware
sponsored by SearchSecurity.com
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

SearchSecurity.com

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

KuppingerCole Report: Access Management and Federation
sponsored by IBM
WHITE PAPER: Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.
Posted: 26 Aug 2016 | Published: 31 Mar 2016

IBM

The Power of Modern Access Management Tools
sponsored by IBM
WHITE PAPER: Find out how you can take back control of access management with an integrated platform for web, mobile & cloud in this white paper.
Posted: 26 Aug 2016 | Published: 30 Sep 2015

IBM

Take Back Control of Access Management
sponsored by IBM
WHITE PAPER: An integrated approach to access management can reduce complexity and thwart security breaches. Access this white paper to learn about the myriad benefits all-in-one access management technology can offer.
Posted: 26 Aug 2016 | Published: 30 Sep 2015

IBM

85% of Customers are Dissatisfied with the Authentication Process
sponsored by NICE Systems, Inc
WHITE PAPER: This infographic reveals what you can do to reduce the burden of authentication for your customers. Learn how to prevent fraud in your contact center, while minimizing interrogation and saving money on every call.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

NICE Systems, Inc

Customer Identity Use Cases: Building a Complete, Contextual Digital Experience
sponsored by Radiant Logic, Inc.
WEBCAST: See how to implement faster authentication with seamless SSO and deploy finer-grained authorization and customized services. Learn about combining these two things to provide your customers with a better digital experience.
Posted: 08 Aug 2016 | Premiered: Oct 8, 2015

Radiant Logic, Inc.

Enabling Secure, Customized Identity Management
sponsored by Radiant Logic, Inc.
WEBCAST: Discover how to deliver smarter security and more customized services to your customers. Listen in to see how a common identity service for all constituents can improve security and deliver better services to your customers, while saving time and money in administration.
Posted: 08 Aug 2016 | Premiered: Sep 18, 2015

Radiant Logic, Inc.

Simplify Cloud Access and Provisioning with a Federated Identity Service
sponsored by Radiant Logic, Inc.
WEBCAST: Delve into the identity integration issues that arise when enterprises connect to cloud applications. Discover how to overcome the challenges by creating a place to authenticate users, utilize a global reference image to provision to cloud apps, and simplify the management of users and groups.
Posted: 05 Aug 2016 | Premiered: Feb 19, 2016

Radiant Logic, Inc.

How to Secure Your IAM System
sponsored by Radiant Logic, Inc.
WEBCAST: Discover how to strengthen the security of your IAM system by encrypting data at rest, adding multi-factor authentication, and protecting key accounts.
Posted: 05 Aug 2016 | Premiered: Apr 28, 2016

Radiant Logic, Inc.

Empower Your Infrastructure and Conquer Complexity with Identity Services
sponsored by Radiant Logic, Inc.
RESOURCE: Access this resource to learn how to empower your infrastructure by implementing effective identity management policies.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

Radiant Logic, Inc.

Overcome Identity Integration Challenges
sponsored by Radiant Logic, Inc.
RESOURCE: In this infographic, get a quick grasp of how you can easily integrate identity using a federated identity service based on virtualization. Learn how you can manage groups dynamically, join attributes from all sources to build global user profiles, and more.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

Radiant Logic, Inc.

Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

Red Hat Enterprise Linux: Secure Identity Management
sponsored by Red Hat
PRODUCT OVERVIEW: Address the challenges of managing identities in Linux or a mixed Linux/Windows environment by centralizing management in one interface. Download this paper to take advantage of Linux's direct integration into your environment to provide host-based access control, and more.
Posted: 14 Jul 2016 | Published: 31 Dec 2014

Red Hat

How to Craft SSO and IAM Strategies on the Cloud
sponsored by OneLogin
EGUIDE: Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.
Posted: 11 Jul 2016 | Published: 05 Jul 2016

OneLogin

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER: In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

How a German Utilities Company Embraced Secure Profile Management
sponsored by VMware
RESOURCE: This infographic shows how one German company overcame its cumbersome profile management practices, enhancing end-user experience and security in the process.
Posted: 06 May 2016 | Published: 31 Dec 2015

VMware

Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

IBM

How IT Leaders Are Innovating with Customer Identity Management
sponsored by Gigya
WHITE PAPER: With IT budgets limited, enterprises often struggle to secure funds for innovations that enable crucial relationships with customers. Access this white paper that explains how a separate customer identity management layer can help you attract customers while maximizing budget and ROI.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

Gigya

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 127 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement