IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management White Papers (View All Report Types)
1 - 25 of 282 Matches Previous Page  |  Next Page
Top 5 Database Security Threats
sponsored by Imperva
WHITE PAPER: According to the Verizon DBIR, hackers are motivated by financial gain, espionage, ideology or grudge, and even fun. This white paper examines the top 5 database security threats and explains how risk sensitive organizations must remain a step ahead in their security posture.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Preparing Your Organization for the GDPR
sponsored by Imperva
WHITE PAPER: Where does your organization stand in terms of GDPR preparedness? Access this resource to uncover 5 questions to determine what GDPR means for your organization and how to prepare.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Imperva

Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

The 10 Universal Truths of Identity and Access Management
sponsored by One Identity
WHITE PAPER: IAM is an ever-moving target that has become a large and integral part of IT operations. Explore this white paper to uncover 10 universal truths of IAM to help you evaluate your need for an IAM approach as well as how to implement and optimize its usage.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

A Comprehensive Defense in the Battle to Reduce Risk & Enhance Security
sponsored by One Identity
WHITE PAPER: Is your IAM approach prepared to secure your enterprise and enable business? This white paper explores how identity analytics can guide your IAM approach in the battle to reduce risk and enhance security.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Getting Started With Attribute Based Access Control
sponsored by Axiomatics
WHITE PAPER: How are you protecting access to your most critical assets? Explore this white paper to gain insight into attribute based access control (ABAC) and uncover 3 major steps to deploying an effective program.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Why PCI DSS Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: For many organizations, compliance with data security standards is very difficult. This white paper dives into IT security compliance for PCI DSS and offers strategies to make your compliance approach tangible and secure.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

IAM for the Real World: Access Management
sponsored by One Identity
WHITE PAPER: A large government agency with 250,000 users across its Windows and Unix/Linux environments found that each individual IT-assisted access management activity cost more than $300. Annually, this cost is staggering. Access this white paper to learn how to advance your access management approach with real-world examples from organizations.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER: One of the most important aspects of an IAM program is the securing, management and governance of privileged accounts. This resource uncovers strategies for successfully managing privileged accounts in order to improve your IAM approach.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

Top 5 Ways to Relieve the Pain of Managing Hybrid AD Environments
sponsored by One Identity
WHITE PAPER: According to One Identity, nearly 90% of organizations worldwide are using Active Directory (AD) for on-premises resources. This e-book addresses 5 challenges that organizations must overcome as they navigate the transition to a hybrid AD implementation.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Access Control is Easy
sponsored by One Identity
WHITE PAPER: Effective access control is a matter of well-managed groups. This resource uncovers how to implement and manage Active Directory (AD) groups and dives into why they are at the center of the access control and governance universe.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

10 Steps to Cleaning up Active Directory User Accounts
sponsored by One Identity
WHITE PAPER: Active Directory (AD) is the foundation of IAM at most organizations and as a result, is one of the most crucial technologies on the network. This resource offers 10 steps to remediate user account problems in AD and to prevent them from occurring in the future.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

5 Steps to Mitigate the Risks of Privileged Accounts
sponsored by One Identity
WHITE PAPER: Granting privileged access increases the risk of a security breach, no matter what industry your organization represents. This resource provides strategies for preventing security breaches and offers 5 steps to mitigate the risks of privileged accounts
Posted: 09 Feb 2018 | Published: 09 Feb 2018

One Identity

Security's Identity Crisis: Are You Overlooking The #1 Attack Vector?
sponsored by Centrify Corporation
WHITE PAPER: According to Gemalto's Breach Level Index Report, breaches were up 164% in 2017. This e-book explores security's identity crisis, helps you assess your current security approach, and offers a method to strengthen your company's identity controls.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Centrify Corporation

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Axiomatics

Why Externalize?
sponsored by Axiomatics
WHITE PAPER: This resource provides insight into the attribute based access control (ABAC) model, explores how it impacts authentication and application security, and reveals 4 common misconceptions.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Axiomatics

5 Fast Facts for API Access Control
sponsored by Axiomatics
WHITE PAPER: With user access oftentimes being instantaneous, it is difficult for administrators to control sensitive data. This resource outlines 5 key API access control facts as well as insight into how to address the challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Axiomatics

Mobile Fintech Fraud
sponsored by Simility
WHITE PAPER: The world is becoming increasingly mobile centric and financial services are no exception. This resource addresses fraud challenges faced by mobile financial services, which can impact profit, reputation and customer loyalty.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Simility

Secure Access: Balancing Flexible Network Access with Enterprise-Class Security
sponsored by Fortinet, Inc.
WHITE PAPER: Read this white paper to find 3 products specifically designed to solve the problem of network access security in the mobile age, and decide for yourself which is the right choice for your business.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

Fortinet, Inc.

Fully Managed Microsoft Azure Includes Security Services
sponsored by Rackspace
WHITE PAPER: Click inside to discover a cloud provider that will help you protect your Azure environments. Read on to learn how they can help to extend your Azure Active Directory IAM system beyond its normal limits, remediate breaches immediately with pre-approved actions, and more.
Posted: 02 Feb 2018 | Published: 22 Mar 2017

Rackspace

Using Threat Analytics to Protect Privileged Access and Prevent Breaches
sponsored by CA Technologies
WHITE PAPER: The rise in cyberattacks points to one trend: Static access controls are not enough. Read this white paper to learn 4 steps to using analytics to protect your enterprise from threats both inside and outside your organization.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

CA Technologies

Establish Your Blueprint For Centralized SSL Certificate Lifecycle Management
sponsored by Entrust, Inc.
WHITE PAPER: Whether due to security events, industry changes, or compliance requirements, the need to identify and manage SSL certificates is critical. This resource offers security and business challenges and reveals a 4 step process for moving to an SSL certificate services platform.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Entrust, Inc.

7 Tough Questions to Ask Before Switching Certification Authorities
sponsored by Entrust, Inc.
WHITE PAPER: A certification authority is responsible for the issuance and management platform of digital certificates, which secure internal servers, web applications, emails and more. This resource offers 7 tough questions to ask before switching certification authorities.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Entrust, Inc.

7 Critical Factors for an Optimized IAM Security Investment
sponsored by Edgile
WHITE PAPER: With security breaches dominating the headlines, CISOs find themselves fighting fires, rather than strategically planning. This resource offers a strategy-first approach allowing CISOs to build better long term investments and stay more secure.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Edgile
1 - 25 of 282 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement