IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed    Add to Google    Add to My Yahoo!
User Provisioning Reports
Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


Forging a New Future with Identity Relationship Management
sponsored by ForgeRock
WHITE PAPER: Access this white paper to explore identity and access management (IAM) technology and its new role as a public-facing, secure, and accessible business enabler for employees, partners, prospects, customers, and devices.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Simplifying the Management of Macs and Mobile Devices
sponsored by Centrify Corporation
WHITE PAPER: Consumerization gives employees a choice, and they're choosing personal products, such as Mac laptops and iOS and Android phones. However, this opens up a world of security risks. Download this white paper to learn about managing and securing Macs and other mobile devices.
Posted: 06 Nov 2015 | Published: 28 Jan 2015

Centrify Corporation

Special Report: Cybersecurity in 2015
sponsored by IBM
WHITE PAPER: This resource breaks down the cyber-attacks of 2014, presenting an overview of cybercrime that can help you stay safe in 2015 and beyond.
Posted: 14 Sep 2015 | Published: 14 Sep 2015


Customer-Focused Organizations Must Take A Strategic Approach To “Identity Relationship Management”
sponsored by ForgeRock
WHITE PAPER: Forrester Consulting has evaluated companies' IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones. Read on and discover why it pays to implement IRM solutions that treat customer identities, and their identity data, as mission-critical for the top line of the business.
Posted: 17 Nov 2015 | Published: 31 Jan 2014


7 Cloud Security Risks That Will Ruin Your Day
sponsored by Intel and IBM
EGUIDE: This expert e-Guide presents today's top 7 cloud security risks that challenge organizations.
Posted: 29 Sep 2015 | Published: 09 Sep 2015

Intel and IBM

The Mobile Cloud: How Cloud Services Cast Dark Shadows on Mobile Activity
sponsored by IBM
WHITE PAPER: Access this article to learn how cloud app security brokers solutions (CASBs) are giving CISOs visibility into employee usage of cloud apps in the enterprise, as well as the benefits of integrating this technology with enterprise mobility management (EMM.)
Posted: 01 Dec 2015 | Published: 04 Nov 2015


Cloud IAM is Set to Break the Sound Barrier
sponsored by Centrify Corporation
WEBCAST: Join guest speaker Andras Cser, VP, Principal Analyst serving security and risk professionals from Forrester Research, and Chris Webber, Security Strategist from Centrify, as they walk through key trends and guidance for the Cloud IAM market.
Posted: 20 Oct 2015 | Premiered: Apr 2, 2015

Centrify Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement