IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed   
IM (Identity Management) Reports
Co-Operative Group's Identity Infrastructure Governs Data, Applications & Users
sponsored by SailPoint Technologies
CASE STUDY: The Co-operative Group was struggling to manage and govern access for over 70,000 employees. They lacked a comprehensive identity governance platform to assist with these efforts. Download this case study to learn how the Co-operative Group was able to address these challenges by using SailPoint's identity governance program.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

SailPoint Technologies

The Case for Open Source IAM
sponsored by WSO2, Inc.
WHITE PAPER: Open source IAM solutions are now gaining attention from enterprises similar to proprietary and commercial IAMs. Why? In this white paper, learn all about the benefits and use cases of open source for IAM today.
Posted: 13 May 2019 | Published: 13 May 2019

WSO2, Inc.

The Journey to IAM Success
sponsored by One Identity
EBOOK: In this e-book, read about the IAM journey that 6 organizations have made - and how One Identity helped them reach their goals.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

One Identity

EMEA Cybercrime Report 2019 - Key Findings
sponsored by LexisNexis Risk Solutions
WEBCAST: In this webinar, Courtney Austin and Ellie Burns from LexisNexis Risk Solutions discuss key findings from the 2019 EMEA Cybercrime Report. Download the webinar to find out what is fueling cybercrime in the EMEA region.
Posted: 05 Sep 2019 | Premiered: Jul 31, 2019

LexisNexis Risk Solutions

The New Frontiers of Identity
sponsored by SailPoint Technologies
WEBCAST: While digital transformation has opened new paths to success, it has also created new frontiers for identity governance that must be addressed. In this webcast, Paul Trulove of SailPoint explains how you can take a comprehensive approach to identity governance.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

SailPoint Technologies

TeamViewer Tensor Integration Webinar
sponsored by TeamViewer
WEBCAST: TeamViewer Tensor has changed the paradigm of remote connectivity by allowing you to assign appropriate user access rights to employees so they can get full desktop access to their work computers and network servers. In this webcast, explore key benefits of TeamViewer Tensor.
Posted: 28 May 2019 | Premiered: May 28, 2019


Critical Steps to a More Secure Mobile Environment in 2019
sponsored by Vox Mobile Solutions
WHITE PAPER: In this check list, discover the 10 crucial steps to achieve a more secure mobile environment in 2019.
Posted: 02 Jul 2019 | Published: 02 Jul 2019

Vox Mobile Solutions

Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019


CyberArk Global Advanced Threat Landscape Report 2019
sponsored by CyberArk Software, Inc
ANALYST REPORT: In order to gain a better understanding of business leaders' engagement with cybersecurity as global organizations transition to true digital businesses, CyberArk conducted a survey. The survey also focuses on the practice of privileged access security. Download the report to explore key findings.
Posted: 20 Aug 2019 | Published: 31 Aug 2019

CyberArk Software, Inc

Zero Trust Internet Is the Answer for 100% Email and Web Security
sponsored by Menlo Security
WHITE PAPER: Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.
Posted: 25 Jul 2019 | Published: 25 Jul 2019

Menlo Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement