IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity Management Reports
1 - 25 of 417 Matches Previous Page  |  Next Page
5 Insider Tips for VPN Attack Protection
sponsored by SecureAuth
WHITE PAPER: This expert white paper examines the five tips to mitigating VPN breaches and protecting your data.  Read on to learn more.
Posted: 30 Mar 2015 | Published: 04 Mar 2015

SecureAuth

Tackle IAM with a Risk-Based Approach
sponsored by Gemalto
EGUIDE: This expert e-guide takes a look at using a risk-based approach to overcoming the hurdles posed by IAM and the shortcomings of traditional and outdated strategies.
Posted: 26 Mar 2015 | Published: 04 Feb 2015

Gemalto

Citrix NetScaler: A Foundation for Next-Gen Datacenter Security
sponsored by Citrix
WHITE PAPER: This white paper reveals how NetScaler is meeting modern demands for more robust datacenter security.
Posted: 25 Mar 2015 | Published: 01 Sep 2012

Citrix

Securing Applications for a Safer Cloud Environment
sponsored by IBM
WHITE PAPER: View this white paper to learn the five steps to combating application breaches in the cloud. Additionally, explore other protocols to reduce risk.
Posted: 25 Mar 2015 | Published: 09 Jul 2014

IBM

IAM: The New Security Perimeter
sponsored by IBM
WHITE PAPER: Access this white paper to explore how IAM platforms reduce risk and keep unknown users and hackers out of your network.
Posted: 25 Mar 2015 | Published: 05 Nov 2013

IBM

The Growing Need for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Access this white paper to reveal why you need FSSO in your IAM strategy to mitigate risk and vulnerabilities. View now to explore the buyer's guide checklist for choosing the ideal FSSO platform and the benefits to expect.
Posted: 25 Mar 2015 | Published: 05 Mar 2014

IBM

Why Role Management has the Spotlight
sponsored by SailPoint Technologies
WHITE PAPER: Uncover how role management can help your organization manage information security and corporate risk in three key areas. Access now to learn more.
Posted: 24 Mar 2015 | Published: 04 Dec 2013

SailPoint Technologies

A Practical Plan for a Successful Sun Migration
sponsored by SailPoint Technologies
WHITE PAPER: Access this white paper to learn how you can migrate from Sun IdM to SailPoint IdentityIQ with an approach that leverages your existing investments and expertise, lowers the total cost of migration, and enables you to improve your identity management services to include identity governance and compliance.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

SailPoint Technologies

Top Identity Governance and Administration Vendors Examined
sponsored by SailPoint Technologies
WHITE PAPER: In this helpful guide, explore the strengths of the leading IGA platforms and vendors. Discover how to evaluate your needs and how each system fits into your IAM and IGA strategy. View now to learn more.
Posted: 24 Mar 2015 | Published: 12 Jan 2015

SailPoint Technologies

How to Empower Users and Maximize Security and Compliance
sponsored by RES Software
WHITE PAPER: In this white paper, learn the four simple steps to enabling anywhere, any device computing while securing multiple end points and access management.
Posted: 23 Mar 2015 | Published: 07 Jan 2015

RES Software

State of IAM: Cloud and Mobile Technologies Expose Security Cracks
sponsored by SailPoint Technologies
WHITE PAPER: In this white paper, uncover the security cracks of mobile and cloud computing that IAM has exposed. View now to explore the state of IAM technology and what you can do to strengthen your strategy. Learn how to protect your data from external and internal threats with proper provisioning and administration controls.
Posted: 23 Mar 2015 | Published: 04 Dec 2013

SailPoint Technologies

Case Study: Simplifying Compliance and Governance with IAM
sponsored by SailPoint Technologies
CASE STUDY: In this white paper, explore several case studies of how leading organizations overcame identity and compliance obstacles and if the paths they pursued could help solve your woes.
Posted: 23 Mar 2015 | Published: 04 Dec 2013

SailPoint Technologies

See clearly in the cloud with threat-aware identity and access management
sponsored by IBM
WHITE PAPER: View this white paper to learn how next-generation cloud security technologies can securely connect people, applications, and devices to cloud environments, eliminating data and application protection concerns.
Posted: 21 Mar 2015 | Published: 31 Oct 2014

IBM

Mitigate Your Biggest Security Risk: Business Users
sponsored by ObserveIT
WHITE PAPER: Do you know who poses the greatest security risk to your organization? Surprisingly, the answer is people closer than you think: your business users. In this white paper, discover five reasons why business users with access to critical applications are so risky.
Posted: 21 Mar 2015 | Published: 21 Mar 2015

ObserveIT

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

How to Prevent the Most Common IAM Failures
sponsored by SailPoint Technologies
WHITE PAPER: In this in-depth resource, discover how management failures can cause unexpected IAM problems.
Posted: 19 Mar 2015 | Published: 08 Oct 2014

SailPoint Technologies

Identity and Access Management Buyer's Guide - 5th Edition
sponsored by SailPoint Technologies
WHITE PAPER: In this buyer's guide, learn the key factors to address when choosing an IAM solution.  Additionally, read on to learn the three starter access management strategy steps.
Posted: 18 Mar 2015 | Published: 14 Jan 2015

SailPoint Technologies

How to Extend Active Directory to the Cloud
sponsored by OneLogin
WEBCAST: This webcast shows you how to integrate Active Directory and cloud-based apps for better security.
Posted: 16 Mar 2015 | Premiered: Nov 19, 2014

OneLogin

Top 3 Identity Management Considerations When Implementing Google Apps for Work
sponsored by OneLogin
WHITE PAPER: In this white paper, explore the three Google Apps Directory Services (GADS) limitations and what it means for your organization. View now to learn how to overcome these challenges.
Posted: 11 Mar 2015 | Published: 03 Mar 2015

OneLogin

Defining a New Standard for Mobile Single Sign-On (SSO)
sponsored by OneLogin
WHITE PAPER: This white paper outlines a new standard protocol to provide SSO for mobile users through a token agent.  View now to learn more
Posted: 11 Mar 2015 | Published: 02 Mar 2015

OneLogin

Mobile SSO & the Rise of Mobile Authentication
sponsored by OneLogin
WHITE PAPER: In this white paper, uncover the top four considerations when defining your mobile and cloud identity strategy. Discover why Identity and Access Management (IAM)-as-a-Service (IDaaS) appears to be the golden ticket for organizations to get a handle on who can and can't access important data. Read on to learn more.
Posted: 11 Mar 2015 | Published: 25 Feb 2015

OneLogin

3 Requirements to Automate Cloud Provisioning
sponsored by OneLogin
WHITE PAPER: Check out this white paper to learn the three requirements to automating cloud provisioning and how to take the strain off of IT admins. View now to learn more.
Posted: 11 Mar 2015 | Published: 28 Jan 2015

OneLogin

Authenticating taxicab services
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

13 Questions You Must Ask When Integrating Office 365 with Active Directory
sponsored by OneLogin
WHITE PAPER: Access this resource to learn the 13 questions to you need to ask to choose the ideal path to pursue to integrate Office 365 with Active Directory.
Posted: 10 Mar 2015 | Published: 25 Feb 2015

OneLogin

5 Steps to HR-Driven Identity Management
sponsored by OneLogin
WHITE PAPER: In this white paper, learn the five steps to minimize vulnerability by shifting identity and access management into the hands of HR. Read on now to learn how to simplify the employee life-cycle management process and close the risk gap between HR and IT.
Posted: 10 Mar 2015 | Published: 18 Feb 2015

OneLogin
1 - 25 of 417 Matches Previous Page    1 2 3 4    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement