Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software Reports
1 - 25 of 124 Matches Previous Page  |  Next Page
When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016


Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Learn why provisioning identities and access in today's enterprise environment is inefficient, how to overcome the ingrained obstacles in its way, and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Migrating from Good for Enterprise to VMware AirWatch: Building the Business Case
sponsored by vmware airwatch
WHITE PAPER: Before you defend the enterprise against mobile threats, you need to defend your business case. Uncover a list of important criteria for selecting a more productive, lower TCO, and identity-integrated platform designed for the long-term.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

vmware airwatch

How one Investment Company Ensures Compliance while Slashing their IT Workload
sponsored by Dell Software
WHITE PAPER: Dragon Capital was able to audit changes to user access permissions and easily meet its compliance requirements. Learn how this investment firm enabled critical changes in real time, investigate incidents in minutes rather than hours or days, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell Software

Designing a Multilayered, In-Depth Defense Approach to Authentication
sponsored by Dell Software
WHITE PAPER: This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Read on to uncover features you should look for in third-party solutions to supplement native security mechanisms.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

5 Steps to Raising Ransomware Resistance
sponsored by
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016


KuppingerCole Report: Access Management and Federation
sponsored by IBM
WHITE PAPER: Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.
Posted: 26 Aug 2016 | Published: 31 Mar 2016


The Power of Modern Access Management Tools
sponsored by IBM
WHITE PAPER: Find out how you can take back control of access management with an integrated platform for web, mobile & cloud in this white paper.
Posted: 26 Aug 2016 | Published: 30 Sep 2015


Take Back Control of Access Management
sponsored by IBM
WHITE PAPER: An integrated approach to access management can reduce complexity and thwart security breaches. Access this white paper to learn about the myriad benefits all-in-one access management technology can offer.
Posted: 26 Aug 2016 | Published: 30 Sep 2015


Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016


Red Hat Enterprise Linux: Secure Identity Management
sponsored by Red Hat
PRODUCT OVERVIEW: Address the challenges of managing identities in Linux or a mixed Linux/Windows environment by centralizing management in one interface. Download this paper to take advantage of Linux's direct integration into your environment to provide host-based access control, and more.
Posted: 14 Jul 2016 | Published: 31 Dec 2014

Red Hat

State of PAM 2016
sponsored by Thycotic
ANALYST REPORT: In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016


How to Craft SSO and IAM Strategies on the Cloud
sponsored by OneLogin
EGUIDE: Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.
Posted: 11 Jul 2016 | Published: 05 Jul 2016


Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016


The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER: In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015


Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015


How IT Leaders Are Innovating with Customer Identity Management
sponsored by Gigya
WHITE PAPER: With IT budgets limited, enterprises often struggle to secure funds for innovations that enable crucial relationships with customers. Access this white paper that explains how a separate customer identity management layer can help you attract customers while maximizing budget and ROI.
Posted: 14 Apr 2016 | Published: 14 Apr 2016


What to Look for in Multifactor Authentication Tools
sponsored by
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

A Guide to Protecting Your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on to learn how to protect assets by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015


How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015


Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 124 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement