IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed    Add to Google    Add to My Yahoo!
User Provisioning Reports
 
Best Practices for Cloud-Based Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: In this expert e-guide, you'll learn the 6 best practices for implementing cloud-based IAM in your organization to avoid security vulnerabilities. View now to learn how to assess your IAM as a service (IAMaaS) options.
Posted: 11 Sep 2015 | Published: 03 Sep 2015

Radiant Logic, Inc.

Unisys Case Study
sponsored by SecureAuth
VIDEO: In this video, you will learn about a simple solution to secure your cloud access. Eliminate soft and hard FOB usage and strengthen your security process.
Posted: 21 Jan 2016 | Premiered: 13 Nov 2015

SecureAuth

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Case Study: Ad Agency Makes Office 365 Secure
sponsored by BitGlass
WHITE PAPER: This case study discusses how a global ad agency found a solution to its Office 365 security concerns. Take a look to see what security measures this organization implemented and how you can do the same.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

What to Expect in 2016: Top 5 Predictions for Security and Access Control
sponsored by SecureAuth
WEBCAST: This informative webinar outlines the top 5 identity and access management trends for 2016. Tune in to learn what's on the horizon for IAM and take a closer look at next generation adaptive authentication so that you can stay a step ahead of the bad guys.
Posted: 24 Jan 2016 | Premiered: Jan 24, 2016

SecureAuth

Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency
sponsored by FinalCode
WHITE PAPER: Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.
Posted: 05 Oct 2015 | Published: 30 Apr 2015

FinalCode

Single-Sign-On: Streamlining Remote Access
sponsored by SecureAuth
CASE STUDY: This case study explores how to use multi-factor authentication and single-sign-on (SSO) to remove the reliance on tokens and secure access to the enterprise network and data. Access now to examine how one organization was able to overcome authentication and access challenges using this strategy.
Posted: 07 May 2015 | Published: 25 Feb 2015

SecureAuth

Security and Performance in One Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement