IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity and Access Management

RSS Feed    Add to Google    Add to My Yahoo!
Identity and Access ManagementReports
 
Using SAML for Identity Management
sponsored by Forum Systems
WHITE PAPER: Check out this white paper to discover why federated identity management is essential for controlling access to applications across multiple different domains.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Forum Systems

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

HP Mobile Security Assessment
sponsored by Hewlett-Packard Company
DATA SHEET: In this resource, discover a mobile security assessment that tests your most sensitive applications.
Posted: 15 Sep 2014 | Published: 01 Jun 2013

Hewlett-Packard Company

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 11 Sep 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

HIPAA/HITECH Compliance Using VMware vCloud Hybrid Service
sponsored by CDW Corporation
WHITE PAPER: Uncover the responsibilities for PHI in the cloud, as well as an introduction to the VMware Business Associate Agreement.
Posted: 15 Sep 2014 | Published: 31 Dec 2013

CDW Corporation

Identity and Access Management Guidelines and How to Improve Your Strategy
sponsored by Forum Systems
EGUIDE: This expert e-guide reveals how to use an IAM maturity model to assess your identity and access management strategy.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

Forum Systems

The Convergence of Physical and Logical Access
sponsored by HID
WEBCAST: This webcast explores the convergence of physical and logical access with a single access card, as well as managing and reporting through a single portal.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

One Time Passwords for Mobile Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how more financial institutions are adopting mobile authentication for on line banking and deploying mobile platforms.
Posted: 24 Jul 2014 | Published: 07 Apr 2014

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement