IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Management of Identity

RSS Feed    Add to Google    Add to My Yahoo!
Management of Identity Reports
Concern for Accidental and Malicious Data Breaches for Data Stored in New Zealand
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on New Zealand and uncovered the fact that most New Zealanders were just as concerned about accidental security breaches as they were with malicious attacks. What other key concerns were there? Download today and find out the facts.
Posted: 29 Sep 2015 | Published: 31 Dec 2014


Single Sign-On Buyer's Evaluation Handbook
sponsored by Imprivata
WHITE PAPER: When you begin your search for a SSO strategy, refer to this helpful evaluation white paper. View now to see what questions you need to ask when choosing a SSO platform and what features you need to have.
Posted: 24 Sep 2015 | Published: 20 May 2015


The Identity of Things (IDoT): Access Management (IAM) Reference Architecture for the Internet Of Things (IoT)
sponsored by ForgeRock
WHITE PAPER: This white paper describes how to apply identity services based on the underlying device architecture, as well as the native protocols and standards being used. Access now and discover which features play a significant role in applying identity services.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Key Considerations for Choosing Your Strong Authentication Strategy
sponsored by Imprivata
WHITE PAPER: This white paper presents the 7 forms of strong authentication and explores the benefits of each one. Continue reading to learn more about the factors to consider when choosing strong authentication and how to take your IAM strategy to the next level.
Posted: 24 Sep 2015 | Published: 28 May 2015


Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

The Growing Need for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Access this white paper to reveal why you need FSSO in your IAM strategy to mitigate risk and vulnerabilities. View now to explore the buyer's guide checklist for choosing the ideal FSSO platform and the benefits to expect.
Posted: 25 Mar 2015 | Published: 05 Mar 2014


Forging a New Future with Identity Relationship Management
sponsored by ForgeRock
WHITE PAPER: Access this white paper to explore identity and access management (IAM) technology and its new role as a public-facing, secure, and accessible business enabler for employees, partners, prospects, customers, and devices.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Adding Macs to Your Enterprise? Start with Identity Management
sponsored by Centrify Corporation
WEBCAST: Watch this on-demand webinar to learn how to completely integrate Macs into your network environment.
Posted: 03 Nov 2015 | Premiered: May 28, 2015

Centrify Corporation

Expert Advice - 20 Practical Tips on Authentication and Access Management from Practiced Professionals
sponsored by Imprivata
WHITE PAPER: Access this white paper to learn 20 expert tips to ramping up security through single sign-on and strong authentication.
Posted: 21 Sep 2015 | Published: 05 May 2015


The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
ESSENTIAL GUIDE: Access this essential guide to examine the security issues relating to Microsoft Azure and details Azures strengths in those areas.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Softchoice Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement