IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management and Access Control Reports
 
Faster Authentication, Smarter Authorization, and a Common Identity for WAM and Federation
sponsored by Radiant Logic, Inc.
WHITE PAPER: Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.
Posted: 04 Apr 2016 | Published: 31 Dec 2015

Radiant Logic, Inc.

Put Your Business Content to Work
sponsored by IBM
MICROSITE: In this comprehensive resource hub, access 13 guides that will enable you to discover how to extract the most value from your business content and how to make it work for you. Learn about content engagement, data and information governance, sales transformation, and much more.
Posted: 28 Jul 2016 | Published: 28 Jul 2016

IBM

Cost-Effectively License Enterprise Mobility Cloud Services for All Your Users
sponsored by Microsoft
DATA SHEET: A cloud-based enterprise mobility suite (EMS) provides users access to the unified experience that they have come to expect. Inside, learn how an EMS boosts productivity, mobile management, and security measures.
Posted: 29 Aug 2016 | Published: 31 Dec 2014

Microsoft

An Operational Model for Breach Analytics and Intelligence
sponsored by Anomali
WHITE PAPER: In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.
Posted: 06 Jun 2016 | Published: 01 May 2016

Anomali

Capture and Manage the Content That Drives Your Business
sponsored by ASG
WHITE PAPER: Many businesses are struggling with content management and information governance requirements. Access this white paper to learn about a real-time engine for Web delivery of document-based content that offers content access and control, archive encryption, lifecycle storage support, and much more.
Posted: 02 Sep 2016 | Published: 18 Aug 2016

ASG

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement