IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed    Add to Google    Add to My Yahoo!
User ProvisioningReports
 
Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This white paper helps break down multiple security information and event management (SIEM) vendor details for your convenience and assistance in finding the right one for your business.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

LogRhythm, Inc.

What CISOs Need to Know About Cloud Computing
sponsored by CloudPassage
WHITE PAPER: This resource highlights key security differences in traditional infrastructures versus the cloud. Click through to learn how to leverage existing methods to create a well-rounded cloud security approach.
Posted: 31 Mar 2014 | Published: 06 Jan 2014

CloudPassage

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy that offers a finer-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security
sponsored by Imprivata
WHITE PAPER: This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs.
Posted: 08 Apr 2014 | Published: 28 Feb 2014

Imprivata

Soarian Information Access: Simplifying and Extending Care Processes
sponsored by Siemens
WHITE PAPER: This white paper features a simplified information access solution that enables healthcare providers with anytime, anywhere workflows to help improve efficiencies and patient care.
Posted: 15 Apr 2014 | Published: 31 Mar 2013

Siemens

Ease GLBA Compliance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by CA Technologies.
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

CA Technologies.

Avoiding Insider Threats to Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Posted: 04 Nov 2013 | Published: 31 Oct 2012

IBM

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement