IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 
Definition continues below.
Identity Management Reports
51 - 75 of 445 Matches Previous Page  |  Next Page
Improve User Acquisition with Customer Identity & Access Management
sponsored by Gigya
WHITE PAPER: In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

Gigya

Case Study: American Cancer Society Adopts a Comprehensive Constituent View
sponsored by Gigya
CASE STUDY: The American Cancer Society needed to more efficiently and securely manage the identities of its volunteers, donors, and participants. This case study discusses the authentication strategy that enabled them to capture and organize more data about their constituents' identities to make complete user profiles.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

Gigya

Secure Data in the Cloud with AWS Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.
Posted: 07 Apr 2016 | Published: 24 Mar 2016

Radiant Logic, Inc.

A Buyer's Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 05 Apr 2016 | Published: 31 Dec 2014

Radiant Logic, Inc.

Faster Authentication, Smarter Authorization, and a Common Identity for WAM and Federation
sponsored by Radiant Logic, Inc.
WHITE PAPER: Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.
Posted: 04 Apr 2016 | Published: 31 Dec 2015

Radiant Logic, Inc.

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.
Posted: 01 Apr 2016 | Published: 31 Dec 2013

Radiant Logic, Inc.

The Key to Secure and Seamless Access to Web and Cloud Applications
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 01 Apr 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

Revitalize and Extend the Reach of Your Current ISAM Portal
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper teaches you how to extend authentication across web apps and leverage existing identity stores for faster, fine-grained authorization.
Posted: 31 Mar 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

How to Federate Access and Identity Together for a Complete IdP
sponsored by Radiant Logic, Inc.
WEBCAST: Learn how federating the identity sources behind your IdP takes you the last mile for smarter and richer attribute-based policies.
Posted: 31 Mar 2016 | Premiered: Feb 12, 2016

Radiant Logic, Inc.

Simplify Cloud Access and Provisioning with Federated Identity
sponsored by Radiant Logic, Inc.
WEBCAST: What happens when there are users outside of AD-LDAP directories? This webinar examines why simply federating access in your organization isn't enough and how to federate your identity layer.
Posted: 30 Mar 2016 | Premiered: Feb 19, 2016

Radiant Logic, Inc.

HDAP: the Big Data LDAP Directory Storage
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.
Posted: 28 Mar 2016 | Premiered: Mar 15, 2016

Radiant Logic, Inc.

Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015

Gigya

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com

Leverage Accurate and Current Customer Data with Social Login
sponsored by Gigya
WHITE PAPER: To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.
Posted: 21 Mar 2016 | Published: 16 Sep 2015

Gigya

The Evolution of Consumer Identity: 5 Biggest Trends
sponsored by Gigya
WHITE PAPER: This resource reveals the 5 biggest trends currently influencing the customer identity and access management space. Learn how to prepare for upcoming developments regarding traditional usernames and passwords vs biometric authentication, regional data privacy regulations, IoT, and more.
Posted: 18 Mar 2016 | Published: 31 Dec 2015

Gigya

Why Identity is at the Heart of the IoT
sponsored by Gigya
WHITE PAPER: This resource describes how a well-designed customer identity and access management (cIAM) strategy can unlock the true capabilities of the IoT. Discover use cases that demonstrate how cIAM can offer secure, personalized user experiences with connected products.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Gigya

Building, Installing, and Configuring a RADIUS Server
sponsored by Global Knowledge
WHITE PAPER: A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Global Knowledge

Top Identity Governance and Administration Vendors Examined
sponsored by IBM
WHITE PAPER: In this Gartner Magic Quadrant, you will explore the strengths of the leading IGA platforms and vendors. Access now to discover how to evaluate your needs and find which system best fits into your IAM and IGA strategy.
Posted: 11 Mar 2016 | Published: 12 Jan 2015

IBM

Vendor Risk Management is Rapidly Changing
sponsored by BitSight
WHITE PAPER: Discover several proactive tips for better vendor risk management (VRM) practices that you can quickly put into place. Learn 4 tips to help you overcome the largest challenges for taking on VRM.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

BitSight

What’s New in the Windows 10 Security Log
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, take a look at the new and updated event entries in Windows 10 and learn how to leverage them to identify malicious activity. Continue reading to uncover the specific auditing and logging events recently added by Microsoft and how to turn data into insights.
Posted: 07 Mar 2016 | Published: 27 Jan 2016

LogRhythm, Inc.

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

The Need-to-Know of Today's Cloud Security
sponsored by SearchCloudComputing.com
EBOOK: In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

SearchCloudComputing.com

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Computer Weekly: Robots at Your Service
sponsored by ComputerWeekly.com
EZINE: Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
Posted: 11 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com
51 - 75 of 445 Matches Previous Page    1 2 3 4 5 6    Next Page
 
IDENTITY MANAGEMENT DEFINITION (continued): …  their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well … 
Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement