IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity and Access Management

RSS Feed    Add to Google    Add to My Yahoo!
Identity and Access Management Reports
Case Study: Sharing Files without Compromising Security
sponsored by FinalCode
WHITE PAPER: In this case study, discover how an electrical service organization obtained quick and easy file-sharing that didn't compromise its security.
Posted: 05 Oct 2015 | Published: 30 Apr 2015


Choosing an IAM architecture
sponsored by ForgeRock
EGUIDE: Today, there are two schools of IAM thought: provider-centric and user-centric, each with their own set of merits. But which is right for your organization? Does it matter? This expert e-guide reviews the two approaches to help you in your search for choosing the ideal IAM architecture.
Posted: 24 Nov 2015 | Published: 19 Nov 2015


Key Considerations for Choosing Your Strong Authentication Strategy
sponsored by Imprivata
WHITE PAPER: This white paper presents the 7 forms of strong authentication and explores the benefits of each one. Continue reading to learn more about the factors to consider when choosing strong authentication and how to take your IAM strategy to the next level.
Posted: 24 Sep 2015 | Published: 28 May 2015


IDC’s Top Ten IT Security Predictions for Asia-Pacific
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this video to uncover the top 10 IT Security predictions from IDC Asia Pacific's head of IT security research, Simon Piff. Tune in as he discusses the potential impact each projection will have on Asia Pacific markets.
Posted: 19 Nov 2015 | Premiered: 16 Nov 2015

RSA, The Security Division of EMC

Provide Identity Integration Into Office 365 and Beyond
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper walks you through the challenges of identity integration and examines the strategies available to simplify the process.
Posted: 26 Oct 2015 | Published: 30 Sep 2015

Ping Identity Corporation

Cloud IAM is Set to Break the Sound Barrier
sponsored by Centrify Corporation
WEBCAST: Join guest speaker Andras Cser, VP, Principal Analyst serving security and risk professionals from Forrester Research, and Chris Webber, Security Strategist from Centrify, as they walk through key trends and guidance for the Cloud IAM market.
Posted: 20 Oct 2015 | Premiered: Apr 2, 2015

Centrify Corporation

Healthcare eCredentials: Security, Mobility, Collaboration
sponsored by Citrix
WHITE PAPER: Discover how to empower healthcare professionals to connect with patients and perform critical processes and objectives regardless of location or device.
Posted: 10 Nov 2015 | Published: 31 Dec 2014


Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


Case Study: Oxford University Hospitals Cuts Waste with Single Sign-On
sponsored by Imprivata
WHITE PAPER: Access this case study to discover how Oxford University Hospitals sped up the process of secure EPR access, cutting out waste and freeing up more time for patient care.
Posted: 25 Sep 2015 | Published: 31 Dec 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement