IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management and Access Control Reports
 
Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Identity and Access Management Buyer's Guide - 5th Edition
sponsored by SailPoint Technologies
WHITE PAPER: In this buyer's guide, learn the key factors to address when choosing an IAM solution.  Additionally, read on to learn the three starter access management strategy steps.
Posted: 18 Mar 2015 | Published: 14 Jan 2015

SailPoint Technologies

Forrester Research: Workforce Personas and the Mobile App Gap
sponsored by Citrix
ANALYST REPORT: Mobile professionals who can't access the apps they need to keep them most productive will inevitably bring their own apps to work, creating security and compliance risks. According to Forrester Research, IT can close this "app gap" with an access strategy that accommodates the unique requirements of various workforce personas. Learn how.
Posted: 14 May 2014 | Published: 04 Nov 2013

Citrix

How to Empower Users and Maximize Security and Compliance
sponsored by RES Software
WHITE PAPER: In this white paper, learn the four simple steps to enabling anywhere, any device computing while securing multiple end points and access management.
Posted: 23 Mar 2015 | Published: 07 Jan 2015

RES Software

Create a Converged Campus Network To Meet the Needs of Your Business Applications
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper to discover a converged campus solution that provides a single, optimized and scalable unified network for secure and consistent access to business critical applications.
Posted: 16 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Limited

Top Identity Governance and Administration Vendors Examined
sponsored by SailPoint Technologies
WHITE PAPER: In this helpful guide, explore the strengths of the leading IGA platforms and vendors. Discover how to evaluate your needs and how each system fits into your IAM and IGA strategy. View now to learn more.
Posted: 24 Mar 2015 | Published: 12 Jan 2015

SailPoint Technologies

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Citrix XenMobile and Cisco ISE Integration
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Cisco Systems, Inc and Citrix

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement