IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity Management Reports
1 - 25 of 466 Matches Previous Page  |  Next Page
How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Understanding the Role of Stolen Credentials in Data Breaches
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn the 2 steps of a successful credential theft, then learn about a service that fights back against both of these attack paths.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Palo Alto Networks

Understanding Identity Governance
sponsored by SailPoint Technologies
EBOOK: Identity governance is one of the more undervalued aspects of enterprise security. Read this white paper to learn why every organization needs identity governance, the four steps to building the case for it, and how you stand to benefit.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

SailPoint Technologies

A Collaborative Strategy for Your Access Management
sponsored by SailPoint Technologies
WHITE PAPER: Today's rapidly changing business environment demands that businesses be agile, innovative and secure. This white paper examines a collaborative strategy of integrating Microsoft Azure Active Directory with the identity governance capabilities of SailPoint Power of Identity.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

SailPoint Technologies

Matching Your Authentication to the Speed of Your Business
sponsored by MicroFocus
WHITE PAPER: This white paper outlines the reality of today's IT environments and the authentication risks associated with them, and explores some tips as to how you can balance the priorities of your business owners and those of central IT to keep your organization productive and safe.
Posted: 15 Nov 2017 | Published: 29 Sep 2017

MicroFocus

A Collaborative Integration for IAM
sponsored by SailPoint Technologies
WHITE PAPER: This paper provides a collaboration strategy of integrating Microsoft Azure Active Directory with SailPoint Identity Governance to improve your IAM approach.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Cloud IAM Goes Beyond SSO
sponsored by SailPoint Technologies
WHITE PAPER: With the adoption of cloud IAM on the rise, managing the user's journey, access control, and governance functionality is mandatory. This paper offers 4 challenges that drive cloud IAM adoption and provides invaluable information on cloud access with single-sign-on, access governance and cloud IAM features.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Magic Quadrant for Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: Security and risk management leaders responsible for IAM should be aware of functional differences between on-premises and cloud-delivered identity governance and administration (IGA). This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's IGA products as well as, a market overview.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

GDPR: What it Means to Your Cybersecurity Strategy
sponsored by RSA
WHITE PAPER: More than 90% of Europeans say they want the same data protection rights regardless of where their data is processed, and as a result the EU GDPR came along. This white paper reveals what the GDPR means for your various cybersecurity strategies and how you'll need to adjust your approaches to comply.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID Global
WHITE PAPER: According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals 5 FAQs to help banking organizations make smart decisions when evaluating mobile banking security.
Posted: 20 Oct 2017 | Published: 31 Dec 2016

HID Global

3 Types of SSL Certificates
sponsored by HID Global
RESOURCE: Are you making the right choice when it comes to your SSL certificate? Take a look at this resource to gain insight into 3 types of SSL certificates to see if you are making the right choice specific to your business.
Posted: 20 Oct 2017 | Published: 13 Jul 2017

HID Global

What is Multi-factor Authentication?
sponsored by HID Global
VIDEO: Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.
Posted: 19 Oct 2017 | Premiered: 19 Oct 2017

HID Global

Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?
sponsored by Simeio
WHITE PAPER: When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Simeio

Identity of Things: The Role of Identity Management in the IoT
sponsored by Amido
WHITE PAPER: Identity and Access Management (IAM) has become a core platform. According to IDG, 91% of IT Managers are seeing identity management as a key enabler for their digital business initiatives. Learn why IAM is evolving with the Internet of Things (IoT), and how to ensure your digital business is built on a firm foundation of identity.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Amido

Digital Transformation: How Identity Impacts Customer Relationships
sponsored by Amido
WHITE PAPER: Your customers expect to be able to use multiple devices to interact with your business. As a result, identity is becoming a cornerstone of digital transformation initiatives. How can you bring identity into the mix and better serve your customers on their terms? Find out inside.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Amido

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

AWS Security Best Practices
sponsored by Amazon Web Services
WHITE PAPER: Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.
Posted: 09 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

Don't Let SaaS Cloud Your Security
sponsored by Verizon
WHITE PAPER: The cloud is transforming all aspects of business, so the need for cloud security is more important than ever. Key into this white paper to discover 5 ways to stay secure in the cloud.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Verizon
1 - 25 of 466 Matches Previous Page    1 2 3 4    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement