Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software Reports
1 - 25 of 141 Matches Previous Page  |  Next Page
Understanding the Role of Stolen Credentials in Data Breaches
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn the 2 steps of a successful credential theft, then learn about a service that fights back against both of these attack paths.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Palo Alto Networks

Understanding Identity Governance
sponsored by SailPoint Technologies
EBOOK: Identity governance is one of the more undervalued aspects of enterprise security. Read this white paper to learn why every organization needs identity governance, the four steps to building the case for it, and how you stand to benefit.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

SailPoint Technologies

A Collaborative Strategy for Your Access Management
sponsored by SailPoint Technologies
WHITE PAPER: Today's rapidly changing business environment demands that businesses be agile, innovative and secure. This white paper examines a collaborative strategy of integrating Microsoft Azure Active Directory with the identity governance capabilities of SailPoint Power of Identity.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

SailPoint Technologies

Matching Your Authentication to the Speed of Your Business
sponsored by MicroFocus
WHITE PAPER: This white paper outlines the reality of today's IT environments and the authentication risks associated with them, and explores some tips as to how you can balance the priorities of your business owners and those of central IT to keep your organization productive and safe.
Posted: 15 Nov 2017 | Published: 29 Sep 2017

MicroFocus

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

What is Multi-factor Authentication?
sponsored by HID Global
VIDEO: Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.
Posted: 19 Oct 2017 | Premiered: 19 Oct 2017

HID Global

Identity of Things: The Role of Identity Management in the IoT
sponsored by Amido
WHITE PAPER: Identity and Access Management (IAM) has become a core platform. According to IDG, 91% of IT Managers are seeing identity management as a key enabler for their digital business initiatives. Learn why IAM is evolving with the Internet of Things (IoT), and how to ensure your digital business is built on a firm foundation of identity.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Amido

VPN Access Made Easier Without Sacrificing Security
sponsored by HID Global
JOURNAL ARTICLE: VPNs create a secure tunnel between company data and employee devices, however they don't protect against weak passwords. Access this resource to learn how to increase the security of the VPN and maintain usability.
Posted: 21 Sep 2017 | Published: 15 Aug 2017

HID Global

Single Sign-on for SAP Solution-based Environments
sponsored by One Identity
WHITE PAPER: Authentication Services from One Identity enables many non-Windows systems – including SAP solutions – to participate as "full citizens" in Active Directory, making SSO a reality. Take a look at this white paper to uncover security benefits provided by authentication services.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Extending Native Active Directory Capabilities to Unix and Linux
sponsored by One Identity
WHITE PAPER: As enterprises become more complex, involving multiple operating systems, the challenges of identity management also become greater. Take a closer look at this white paper to explore how you can simplify identity management across multiple operating systems.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Trusted Identities: Solving Fraud in Banking
sponsored by HID Global
WHITE PAPER: One of the biggest challenges facing banks today is how to provide secure and trusted services while substantially improving customer experience. Take a closer look at this white paper to reveal a holistic multi-channel identity and access management platform that can improve the user experience and create a higher level of mutual trust.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover why securing and managing privileged accounts should be an integral part of your organization's strategy in achieving SWIFT CSCF compliance.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Proactively Protect Against Ransomware
sponsored by CyberArk Software, Inc
VIDEO: Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.
Posted: 19 Sep 2017 | Premiered: 19 Sep 2017

CyberArk Software, Inc

Managing External Identities
sponsored by Simeio
WEBCAST: Listen to this webinar to uncover approaches to enhance your IAM security as well as customer experience.
Posted: 07 Sep 2017 | Premiered: Sep 5, 2017

Simeio

As Learning Hinges On Devices And Applications, Challenges Increase For IT
sponsored by IBM
WHITE PAPER: Explore the importance of putting security measures in place to restrict apps, documents and data to specific users and groups, ensuring sensitive data does not end up in the wrong hands. Learn from the education industry on how endpoint management can help you achieve stronger data security.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

IBM

Advanced IAM for Endpoint and Mobile
sponsored by IBM
WHITE PAPER: Inside this white paper, learn how IAM can help simplify access to your cloud and mobile apps while increasing security.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

IBM

Unified Endpoint Management for All Device Types
sponsored by IBM
WHITE PAPER: Organizations are now on the hook to manage virtually every type of end-user device and many security risks come from a mixed-device environment. Inside this white paper, uncover how a unified endpoint management system can help your organization achieve the security and visibility it needs.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

IBM

Privilege Management Overview: Strengths and Challenges
sponsored by One Identity
ANALYST REPORT: In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

One Identity

A Tactical Guide to Finding the Right IDaaS Provider
sponsored by Simeio
WHITE PAPER: The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Simeio

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
WHITE PAPER: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

Simplify Authentication with Personal Identity Verification
sponsored by HID Global
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID Global

Black Hat Survey 2017
sponsored by Thycotic
RESEARCH CONTENT: At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Thycotic

The Pitfalls and Promises of Authentication in the IoT
sponsored by iovation, Inc.
WEBCAST: Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.
Posted: 07 Aug 2017 | Premiered: Aug 7, 2017

iovation, Inc.

5 Strategies to Improve Your Security Posture
sponsored by Citrix
WHITE PAPER: Reducing business security risk, protecting sensitive customer data, and ensuring compliance with regulations and standards are priorities for all organizations. Explore 5 ways you can overcome these security challenges.
Posted: 02 Aug 2017 | Published: 31 Dec 2016

Citrix

Overcome Authentication Challenges: Balancing Security and User Experience
sponsored by iovation, Inc.
VIDEO: How can you increase authentication security without impacting user experience? Take a closer look at flexible authentication that can help you meet these challenges with global fraud and trust insight, interactive multi-factor authentication, and more.
Posted: 01 Aug 2017 | Premiered: 01 Aug 2017

iovation, Inc.
1 - 25 of 141 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement