IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed    Add to Google    Add to My Yahoo!
User ID Management Reports
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
sponsored by OneLogin
WEBCAST: In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.
Posted: 07 Jul 2016 | Premiered: Jun 1, 2016


How one Investment Company Ensures Compliance while Slashing their IT Workload
sponsored by Dell Software
WHITE PAPER: Dragon Capital was able to audit changes to user access permissions and easily meet its compliance requirements. Learn how this investment firm enabled critical changes in real time, investigate incidents in minutes rather than hours or days, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell Software

State of PAM 2016
sponsored by Thycotic
ANALYST REPORT: In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016


Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016


Moving Past the Password? Not So Fast
sponsored by
EBOOK: The password might not be dead, but that doesn't mean it's working. This ebook looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
Posted: 20 May 2016 | Published: 20 May 2016

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

Managing AWS: Gain Transparency into Cloud Computing
sponsored by Splunk
WEBCAST: Explore how FINRA, the Financial Industry Regulatory Authority, adopted a cloud services platform with an identity access management feature along with integration with AWS CloudTrail data to improve their security posture.
Posted: 07 Apr 2016 | Premiered: Apr 7, 2016


Crafting an Identity-Based Security Strategy for Cloud
sponsored by Hewlett Packard Enterprise
EGUIDE: IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Hewlett Packard Enterprise

Migrating from Good for Enterprise to VMware AirWatch: Building the Business Case
sponsored by vmware airwatch
WHITE PAPER: Before you defend the enterprise against mobile threats, you need to defend your business case. Uncover a list of important criteria for selecting a more productive, lower TCO, and identity-integrated platform designed for the long-term.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

vmware airwatch

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement