IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management and Access Control Reports
 
How to Extend Identity Security To Your APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses the new authentication and authorization standards for REST APIs, how they can be composed with SAML, and details about how they work to provide IAM and API security. Continue reading to learn more.
Posted: 26 Oct 2015 | Published: 07 May 2014

Ping Identity Corporation

Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Is Third-Party Access the Next IAM Frontier?
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide explores the lack of IAM security for third parties and the steps to take to secure your data. Access this exclusive resource now to rectify lapses in third-party security before vulnerabilities can be exploited.
Posted: 11 Sep 2015 | Published: 02 Sep 2015

Radiant Logic, Inc.

Social Networking: 5 Risks of Team Login Sharing
sponsored by Dashlane Inc.
WHITE PAPER: Discover the 5 risks of team social networking login sharing and how to secure an always-on culture to connect with customers.
Posted: 17 Dec 2015 | Published: 09 Dec 2015

Dashlane Inc.

Business Challenges and Benefits of IAM
sponsored by ForgeRock
EGUIDE: View this expert e-guide to learn the current IAM challenges and how to restructure IAM into a streamlined, central, and non-silo approach.
Posted: 01 Dec 2015 | Published: 25 Nov 2015

ForgeRock

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

Secure Centralized Identity and Password Management
sponsored by Dashlane Inc.
WEBCAST: In this webcast, learn how to safely centralize all login credentials for users on their own desktops and mobile devices.
Posted: 07 Dec 2015 | Premiered: Nov 11, 2015

Dashlane Inc.

Simplify Cloud Access and Provisioning with a Federated Identity Service
sponsored by Radiant Logic, Inc.
WEBCAST: What happens when there are users outside of AD-LDAP directories? This webinar examines why simply federating access in your organization isn't enough and how to federate your identity layer.
Posted: 30 Mar 2016 | Premiered: Feb 19, 2016

Radiant Logic, Inc.

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Delivering the Fastest Clinical Desktop in Healthcare
sponsored by Aventura
WHITE PAPER: This white paper examines how to gain greater control over the clinical desktop. Continue reading to learn how to protect PHI security at all times and maintain a clear audit trail.
Posted: 25 Aug 2015 | Published: 29 Jul 2015

Aventura
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement