IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed    Add to Google    Add to My Yahoo!
User ID Management Reports
 
Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID Global

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Identity of Things: The Role of Identity Management in the IoT
sponsored by Amido
WHITE PAPER: Identity and Access Management (IAM) has become a core platform. According to IDG, 91% of IT Managers are seeing identity management as a key enabler for their digital business initiatives. Learn why IAM is evolving with the Internet of Things (IoT), and how to ensure your digital business is built on a firm foundation of identity.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Amido

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover why securing and managing privileged accounts should be an integral part of your organization's strategy in achieving SWIFT CSCF compliance.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Unified Endpoint Management for All Device Types
sponsored by IBM
WHITE PAPER: Organizations are now on the hook to manage virtually every type of end-user device and many security risks come from a mixed-device environment. Inside this white paper, uncover how a unified endpoint management system can help your organization achieve the security and visibility it needs.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

IBM

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

ActivID Authentication Appliance for Enterprise
sponsored by HID Global
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

Trusted Identities: Solving Fraud in Banking
sponsored by HID Global
WHITE PAPER: One of the biggest challenges facing banks today is how to provide secure and trusted services while substantially improving customer experience. Take a closer look at this white paper to reveal a holistic multi-channel identity and access management platform that can improve the user experience and create a higher level of mutual trust.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

How IAM Addresses Unstructured Content Security Risks
sponsored by STEALTHbits
EGUIDE: Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.
Posted: 11 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

STEALTHbits
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement