IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity Management Reports
1 - 25 of 429 Matches Previous Page  |  Next Page
Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that drives IT risk reduction and operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Read on to discover how this platform can allow your enterprise to protect and manage all your credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Layered Security Strategies for a Mobile-First World
sponsored by Microsoft
WHITE PAPER: This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.
Posted: 03 Feb 2016 | Published: 27 Nov 2015

Microsoft

Best Practices for Securing Privileged Identities
sponsored by CA Technologies
WHITE PAPER: Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.
Posted: 01 Feb 2016 | Published: 30 Jun 2015

CA Technologies

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

Context-Aware, Dynamic Access Control
sponsored by Cryptzone
RESOURCE: This brief resource outlines how security pros need to take a dynamic approach to secure network access. Read on to learn about a new platform that considers both context and identity to grant access to your network, and see if it's right for your business.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

Cryptzone

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Customer Success Story: Unisys Video Case Study
sponsored by SecureAuth
VIDEO: This case study details how one company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.
Posted: 25 Jan 2016 | Premiered: 25 Jan 2016

SecureAuth

Eliminating the Drawbacks of Distributed SaaS Provider Identity
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Deploy an Enterprise Mobility Gateway to Optimize Access Control
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to scale, secure, and optimize control of your anytime, anywhere network, cloud, and application access. Read this paper to securely manage your workforce mobility and unburden your IT department and learn how to deliver seamless user access to all web-based resources.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

How to Stop Cyber Attacks Using Adaptive Authentication
sponsored by SecureAuth
WEBCAST: This informative webinar takes a look at how next generation adaptive authentication so that you can stay a step ahead of criminals. Tune in to learn how you can easily identify suspicious actors before they enter your network, not after they violate a policy.
Posted: 24 Jan 2016 | Premiered: Dec 2, 2015

SecureAuth

What to Expect in 2016: Top 5 Predictions for Security and Access Control
sponsored by SecureAuth
WEBCAST: This informative webinar outlines the top 5 identity and access management trends for 2016. Tune in to learn what's on the horizon for IAM and take a closer look at next generation adaptive authentication so that you can stay a step ahead of the bad guys.
Posted: 24 Jan 2016 | Premiered: Jan 24, 2016

SecureAuth

Kelsey Seybold Clinic Case Study
sponsored by SecureAuth
VIDEO: This case study details how one healthcare company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.
Posted: 22 Jan 2016 | Premiered: 22 Jan 2016

SecureAuth

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage, and learn how to automate SSH key management, compliance reporting, and more.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

SecureAuth - Houston Methodist
sponsored by SecureAuth
VIDEO: In this video, you will learn how to quickly and easily secure your authentication process for your employees to access both existing and new technologies. Move your business into the cloud with confidently and securely.
Posted: 21 Jan 2016 | Premiered: 15 Jan 2015

SecureAuth

Unisys Case Study
sponsored by SecureAuth
VIDEO: In this video, you will learn about a simple solution to secure your cloud access. Eliminate soft and hard FOB usage and strengthen your security process.
Posted: 21 Jan 2016 | Premiered: 13 Nov 2015

SecureAuth

Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.
Posted: 20 Jan 2016 | Published: 30 Jun 2015

SecureAuth

Using Identity to Create Next Generation, Risk-based Access Management
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.
Posted: 20 Jan 2016 | Published: 31 Aug 2015

SecureAuth

Evaluating Standout Services in the Cloud Identity and Access Management Sector
sponsored by SecureAuth
WHITE PAPER: If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.
Posted: 20 Jan 2016 | Published: 31 Mar 2015

SecureAuth

The Crucial Security Role of a Cloud Directory
sponsored by Microsoft
WEBCAST: In this webcast, independent analyst and blogger Jack Madden takes a closer look at how a cloud directory can play a crucial security role in user and identity management for mobile and beyond.
Posted: 18 Jan 2016 | Premiered: Jan 18, 2016

Microsoft

Case Study: National Healthcare Provider Secures Office 365
sponsored by Palerra Inc.
CASE STUDY: In this white paper, review how one of the largest national healthcare providers in the U.S. filled in Office 365 and cloud security gaps and adhere to regulatory requirements.
Posted: 14 Jan 2016 | Published: 02 Dec 2015

Palerra Inc.

The Challenge of Keeping IAM Simple
sponsored by Thycotic
EGUIDE: This expert e-guide presents the individual challenges the 4 key IAM roles face as they work to mitigate identity fraud/theft. Continue reading to learn why previous IAM projects have failed and how you can overcome the many challenges your organization faces to simplify your IAM approach.
Posted: 14 Jan 2016 | Published: 14 Jan 2015

Thycotic
1 - 25 of 429 Matches Previous Page    1 2 3 4    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement