IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity and Access Management

RSS Feed    Add to Google    Add to My Yahoo!
Identity and Access Management Reports
 
Controlling the uncontrollable
sponsored by Microsoft
WHITE PAPER: 29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

Securing Office 365 with Symantec
sponsored by Symantec Corporation
PRODUCT OVERVIEW: How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Single Sign-On Solutions for Employees to Microsoft Office 365
sponsored by Ping Identity Corporation
WHITE PAPER: Discover how to avoid deployment complexities and multiple logins and gain effortless access to Office 365 and other applications.
Posted: 26 Oct 2015 | Published: 13 Nov 2014

Ping Identity Corporation

Cyber Security Intelligence Index for Retail
sponsored by IBM
WHITE PAPER: This security intelligence report examines the types of threats that retailers face and gives advice for staying safe. Access it now to learn how you can protect your retail organization from advanced attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

IBM

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Provide Identity Integration Into Office 365 and Beyond
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper walks you through the challenges of identity integration and examines the strategies available to simplify the process.
Posted: 26 Oct 2015 | Published: 30 Sep 2015

Ping Identity Corporation

Six steps to control the uncontrollable
sponsored by Microsoft
WHITE PAPER: Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.
Posted: 18 May 2016 | Published: 04 May 2016

Microsoft

IAM for Web Resources and APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper teaches you how to harness open standards like SAML to enable secure web SSO, protect APIs, and provide dynamic session management to employees.
Posted: 28 Oct 2015 | Published: 17 Jun 2015

Ping Identity Corporation

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement