IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management and Access ControlReports
 
Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-in 2014 Vendor Assessment
sponsored by CA Technologies.
ASSESSMENT TOOL: Explore this study conducted by IDC that compares vendors in the IAM market, particularly catering to FSSO programs.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

CA Technologies.

Enabling a secure and convenient online banking experience
sponsored by HID
WHITE PAPER: In this white paper, discover security solutions that are scalable, secure and simple to implement for online banking.
Posted: 09 Jul 2014 | Published: 03 May 2013

HID

The Future of Data Security: A Zero Trust Approach
sponsored by Digital Guardian
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

Digital Guardian

KAS BANK Discovers a Better Way to Secure High-value Transactions
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a solution that delivered the highest level of security with a reusable infrastructure.
Posted: 04 Aug 2014 | Published: 25 Mar 2013

HID

Securing the Mobile Cloud Connected Enterprise
sponsored by CA Technologies.
WHITE PAPER: This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

CA Technologies.

Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

Fighting Banking Fraud Without Driving Away Customers
sponsored by iovation, Inc.
WHITE PAPER: In this white paper, discover a solution that offers advanced device identification and reputation services and improves the overall customer experience with online banking—at the same time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

HID Global’s Identity Assurance SMB Solution
sponsored by HID
DATA SHEET: In this resource, explore how a strong authentication method is possible without tokens or any complexity.
Posted: 10 Jul 2014 | Published: 03 May 2013

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement