IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Management of Identity

RSS Feed    Add to Google    Add to My Yahoo!
Management of Identity Reports
 
How to Craft SSO and IAM Strategies on the Cloud
sponsored by OneLogin
EGUIDE: Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.
Posted: 11 Jul 2016 | Published: 05 Jul 2016

OneLogin

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on to learn how to protect assets (and control access risks and separation-of-duties (SoD) violations) by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

How to Secure Your IAM System
sponsored by Radiant Logic, Inc.
WEBCAST: Discover how to strengthen the security of your IAM system by encrypting data at rest, adding multi-factor authentication, and protecting key accounts.
Posted: 05 Aug 2016 | Premiered: Apr 28, 2016

Radiant Logic, Inc.

Identity Crisis?
sponsored by SearchSecurity.com
EBOOK: IAM security policies must take into account the latest technology developments, especially cloud and the internet of things.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

SearchSecurity.com

10 Things Your Cybersecurity Solution Must Do
sponsored by Palo Alto Networks
WHITE PAPER: As cybercrime evolves, so must your defence strategy to secure your organisation; however, multiple tools often do not mesh perfectly and vulnerabilities are left open. In this white paper, learn the 10 must-have security capabilities for your strategy.
Posted: 15 Feb 2016 | Published: 23 Dec 2015

Palo Alto Networks

Increasing the Efficiency of Case File Coordination in Social Services
sponsored by IBM
WHITE PAPER: Learn how to leverage advanced case management solutions by increasing the efficiency of case file coordinator in social services.
Posted: 24 Mar 2015 | Published: 10 Oct 2011

IBM

Secure Data in the Cloud with AWS Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.
Posted: 07 Apr 2016 | Published: 24 Mar 2016

Radiant Logic, Inc.

Leverage Accurate and Current Customer Data with Social Login
sponsored by Gigya
WHITE PAPER: To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.
Posted: 21 Mar 2016 | Published: 16 Sep 2015

Gigya

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement