IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity Management Reports
1 - 25 of 405 Matches Previous Page  |  Next Page
Challenges and Benefits of Making a Business Case for IAM
sponsored by Nexmo
EGUIDE: This expert e-guide explores the 5 critical issues in IAM that have plagued IT for the past 5 years. Additionally, continue reading to learn how one organizations is using IAM as a strategic tool for improving performance on top of information security.
Posted: 15 May 2015 | Published: 22 Apr 2015

Nexmo

Next Generation Cloud Security
sponsored by Symantec
WHITE PAPER: In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec

Extend Your Identity Management Services to the Cloud
sponsored by Oracle Corporation
WEBCAST: Access this webcast to learn how to extend Identity Management Services to the cloud, automating SaaS account provisioning, enabling single sign-on and providing detailed activity reports for today's customers.
Posted: 13 May 2015 | Premiered: May 13, 2015

Oracle Corporation

Governance-Driven Provisioning: The Future of Provisioning
sponsored by RSA
WHITE PAPER: This white paper explores the history of provisioning challenges organizations have faced and what the future holds for the technology and network security. View now to learn how a governance-driven approach improves your overall identity and access management (IAM) strategy and avoids the pitfalls of a traditional architecture.
Posted: 08 May 2015 | Published: 29 Apr 2015

RSA

Data Governance Risk: Know Who Has Your Data
sponsored by RSA
RESOURCE: Did you know that 76% of organizations find it challenging to control access to sensitive data? Access this brief infographic to gain a better understanding of common data governance challenges and the dire consequences if they are not addressed.
Posted: 08 May 2015 | Published: 24 Feb 2015

RSA

IAM - The Foundation of Cloud Security
sponsored by Symantec
WHITE PAPER: This brief white paper examines key components for an effective IAM program to protect your sensitive data from unauthorized access.
Posted: 08 May 2015 | Published: 11 Dec 2014

Symantec

Single-Sign-On: Streamlining Remote Access
sponsored by SecureAuth
CASE STUDY: This case study explores how to use multi-factor authentication and single-sign-on (SSO) to remove the reliance on tokens and secure access to the enterprise network and data. Access now to examine how one organization was able to overcome authentication and access challenges using this strategy.
Posted: 07 May 2015 | Published: 25 Feb 2015

SecureAuth

Hybrid Environments Demand Coordinated IAM for both Security and Agility
sponsored by Microsoft
WHITE PAPER: Access this resource to see the results of a Forrester Consulting report which reveals how organizations are using IAM in hybrid clouds and the benefits it can bring if handled with care.
Posted: 07 May 2015 | Published: 31 May 2014

Microsoft

Case Study: Ensuring Automated Access Governance
sponsored by RSA
CASE STUDY: In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.
Posted: 06 May 2015 | Published: 18 Mar 2015

RSA

Hybrid Environments Demand Coordinated IAM For Both Security And Agility
sponsored by Microsoft
WHITE PAPER: View this informative report issued by Forrester that explains the IAM challenges firms are facing with hybrid cloud architecture, how these are being addressed currently, and the projected evolution of these management techniques in response to continued and accelerated cloud adoption.
Posted: 06 May 2015 | Published: 01 May 2014

Microsoft

The Evolution of Provisioning
sponsored by RSA
WHITE PAPER: This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.
Posted: 05 May 2015 | Published: 04 Dec 2014

RSA

Case Study: Secure File Sharing with Investors
sponsored by IntraLinks, Inc
CASE STUDY: This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.
Posted: 01 May 2015 | Published: 04 Dec 2014

IntraLinks, Inc

An Inside Look at the Azure Active Directory
sponsored by Microsoft
VIDEO: In this video, learn about Microsoft's Azure Active Directory from a developer's standpoint and get a glimpse of the new identity features in Visual Studio 2015 that make it easy to secure applications with Azure AD
Posted: 01 May 2015 | Premiered: 01 May 2015

Microsoft

Identity and Access Management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom covers need-to-know information about identity and access management, including best practices as well as some new tools to help manage your IAM strategy.
Posted: 30 Apr 2015 | Premiered: 29 Apr 2015

SearchSecurity.com

Azure Active Directory Solutions for Identity and Access Management
sponsored by Microsoft
WHITE PAPER: In this white paper, discover several common scenarios and understand how Azure™ Active Directory® (Azure AD) provides a comprehensive solution that addresses identity and access management requirements for on-premises and cloud applications, including Office 365 and a world of non-Microsoft SaaS applications.
Posted: 30 Apr 2015 | Published: 01 Feb 2014

Microsoft

Securing Shared Data through FSS systems
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how a robust file sync and share (FSS) system can secure data accessed by collaborators.
Posted: 29 Apr 2015 | Published: 30 Dec 2014

IntraLinks, Inc

Data Security Strategies for Next Gen Data Warehouses
sponsored by IBM
WHITE PAPER: In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.
Posted: 22 Apr 2015 | Published: 17 Jul 2013

IBM

4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER: This white paper outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe without hindering user performance.
Posted: 21 Apr 2015 | Published: 18 Jun 2014

IBM

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

Combating Password Sharing and Misuse with IAM
sponsored by SailPoint Technologies
EGUIDE: In this expert eguide, explore the staggering statistics of irresponsible password use and how IAM can save your organization from being in the next breach headline.
Posted: 06 Apr 2015 | Published: 11 Mar 2015

SailPoint Technologies

Helpful Hints for Identity and Access Management
sponsored by SailPoint Technologies
EGUIDE: This expert e-guide walks you through the 15 IAM challenges of today and how to craft a strategy to overcome or avoid them. View now to learn more.
Posted: 06 Apr 2015 | Published: 18 Mar 2015

SailPoint Technologies

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Security Best Practices for Amazon Web Services
sponsored by AlienVault
WHITE PAPER: In this white paper, learn how to be a smart user of AWS with tips for security best practices.
Posted: 31 Mar 2015 | Published: 12 Jan 2015

AlienVault

5 Insider Tips for VPN Attack Protection
sponsored by SecureAuth
WHITE PAPER: This expert white paper examines the five tips to mitigating VPN breaches and protecting your data.  Read on to learn more.
Posted: 30 Mar 2015 | Published: 04 Mar 2015

SecureAuth
1 - 25 of 405 Matches Previous Page    1 2 3 4    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement