IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed    Add to Google    Add to My Yahoo!
User ID Management Reports
 
Vendor Assessment: Access Management, Worldwide
sponsored by Centrify Corporation
ANALYST REPORT: The access management market has evolved beyond supporting traditional web applications to support mobile applications and APIs – now there are more choices than ever when it comes to vendors that offer IDaaS. Download this Report to take a look at a vendor comparison that outlines the strengths and weaknesses of vendors in the space.
Posted: 28 Jun 2017 | Published: 07 Jun 2017

Centrify Corporation

A Computer Weekly Buyer's Guide to Access Control
sponsored by ComputerWeekly.com
EBOOK: In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.
Posted: 29 Apr 2016 | Published: 03 May 2016

ComputerWeekly.com

Build Your Identity and Access Management Strategy
sponsored by RSA
RESEARCH CONTENT: This Forrester Research report provides guidance for the development of a compelling and successful identity and access management strategic plan.
Posted: 23 Aug 2017 | Published: 03 Apr 2017

RSA

Mobility in the Workplace: Balance Security and User Experience
sponsored by HID
EBOOK: This e-book describes the security landscape for mobile devices and how you can improve the user experience on mobile devices while still protecting your assets and managing costs efficiently.
Posted: 07 Jun 2016 | Published: 31 Dec 2015

HID

GDPR Primer for the C-Suite and Board of Directors
sponsored by CyberArk Software, Inc
WHITE PAPER: Take a closer look at this white paper to reveal what executives and board members need to know to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

STEALTHbits

Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
sponsored by ModoModo
EGUIDE: If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
Posted: 23 Feb 2017 | Published: 17 Feb 2017

ModoModo

Mobile Security Challenges: Solutions and Best Practices
sponsored by BlackBerry
EGUIDE: Today is an era of "mobile-first" everything and companies are transforming their operations by leveraging mobile technology. However, mobility hasn't come without its challenges. Discover solutions to common mobility issues such as identity management, and how to ensure your mobile-first operations are mission critical and IoT optimized.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

How IAM Addresses Unstructured Content Security Risks
sponsored by STEALTHbits
EGUIDE: Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.
Posted: 11 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

The Digital Certificate: How It Works, Which to Buy
sponsored by SearchSecurity.com
EBOOK: If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement