IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity Management Reports
1 - 25 of 382 Matches Previous Page  |  Next Page
Security Solutions for Microsoft Applications
sponsored by SafeNet, Inc.
EBOOK: This white paper examines a collection of security technologies and services that focus on three key areas of security management: secure application deployment, threat mitigation and access control.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

SafeNet, Inc.

White Paper: Identity is the Center of Always-on Connectivity
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper examines the advantages organizations stand to gain by using an identity and access management platform to federate access control across all applications and create a centralized view of all your users' information, allowing you to dramatically improve your customer experience.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

Ping Identity Corporation

Managing Identity as the New Perimeter
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides a comprehensive overview of how mobility and virtualization trends are impacting identity and access management (IAM), what solutions are available to address potential challenges, and how to future-proof your identity management strategy for any business scenario.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

Ping Identity Corporation

Maximize Data Security with Encryption and Key Management
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores a comprehensive approach to protecting the digital and traditional information that your enterprise collects and utilizes, based on 5 best practices for data security laid out by IBM.
Posted: 29 Jan 2015 | Published: 30 Jun 2014

SafeNet, Inc.

eBook: How Customer Experience Impacts Your Identity and Access Management Practices
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses how customer experience influences IAM and security and examines the actions you can take to deliver secure, seamless experience for your customers.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

Analyst Report: Executive Buyers Guide to Identity and Access Management Solutions
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper examines some of the most important trends security managers need to be aware of and discusses the questions you need to ask when evaluating and possibly reforming your security strategy.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

White Paper: SAML 101
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language - SAML. It describes why standards like SAML are necessary for implementing federated identity across organizations.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

eBook: CIOs Guide to Modern Identity
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper explores five key trends impacting CIOs and security management today, and discusses how focusing on authenticating user identity versus protecting the endpoint can help companies successfully overcome the security challenges presented by these key trends.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

Enterprise Identity Security Management
sponsored by BlackBerry
WEBCAST: View this webcast to learn how you can control policies and access with a mobile enterprise identity platform. Watch now to learn how to protect your cloud application and user data.
Posted: 23 Jan 2015 | Premiered: Nov 5, 2014

BlackBerry

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

The Relationship Between Identity Management and Compliance
sponsored by ObserveIT
EGUIDE: This expert guide asks whether anomaly-based user activity monitoring is the only way to stop data breaches, and also explains how IAM should and shouldn't be used to support enterprise compliance processes.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

ObserveIT

Oracle Identity Manager vs. Tivoli Identity Manager: IAMs fight for the win
sponsored by IT Central Station
ESSENTIAL GUIDE: With the amount of identity and access management solutions out there, sometimes it can be hard to decipher fact from fiction when it comes to reading user reviews. Find out what verified IT experts say about IAM products in this IT Central Station guide.
Posted: 05 Dec 2014 | Published: 05 Dec 2014


Identity and Access Management Guidelines
sponsored by ObserveIT
EGUIDE: In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

ObserveIT

Trends Reshaping Wireless Networking
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

SearchNetworking.com

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Identity and Access Management
sponsored by SearchSecurity.com
EBOOK: This Tech Guide on identity and access management (IAM) from SearchSecurity.com outlines the issues associated with IAM programs, how to build an effective strategy, why privilege creep has become such a challenge, and more!
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SearchSecurity.com

How Telcos Can Outpace Commoditization in the Application Economy
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how telecommunications service providers are uniquely positioned to leverage their infrastructure, expertise, and insights to provide identity management services for the application economy.
Posted: 13 Nov 2014 | Published: 29 Aug 2014

CA Technologies.

Security in the Hybrid Cloud, Now and in 2016
sponsored by F5 Networks
RESOURCE: The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

F5 Networks

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Computer Weekly – 9 December 2014: The most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ComputerWeekly.com

Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
1 - 25 of 382 Matches Previous Page    1 2 3 4    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement