IT Systems  >   Business Systems  >   Security Systems  >  

Identification Systems

RSS Feed   
Identification Systems Reports
1 - 25 of 37 Matches Previous Page  |  Next Page
Contextual Awareness: Advancing Identity and Access Management to the Next Level of Security Effectiveness
sponsored by CyberArk Software, Inc
ANALYST REPORT: For organizations to make decisions on the adoption of contextually aware platforms, EMA conducted research on the current requirements, use, and outcomes of utilizing contextually aware IAM solutions. Take this short survey to unlock a report detailing the findings from this survey.
Posted: 02 Aug 2021 | Published: 19 Aug 2021

CyberArk Software, Inc

A Guide for Transitioning to Adaptive Access Management
sponsored by CyberArk Software, Inc
EGUIDE: This white paper details an access management maturity model that can help you make tactical decisions on adopting an IAM solution. Following this 4-phase approach to implementing the right IAM solution will enable you to facilitate secure and frictionless identity security, adaptive access for your environment.
Posted: 02 Aug 2021 | Published: 19 Aug 2021

CyberArk Software, Inc

Top Ten Considerations When Choosing a Modern Single Sign- On Solution
sponsored by CyberArk Software, Inc
WHITE PAPER: Single Sign-On (SSO) solutions are instrumental in controlling employee access to applications and systems. However, selecting the right one can be a big challenge. With this white paper, discover 10 key considerations that will help you to select the best SSO for your organization.
Posted: 02 Aug 2021 | Published: 16 Aug 2021

CyberArk Software, Inc

iDaaS Buyer's Guide
sponsored by CyberArk Software, Inc
EBOOK: With help from this buyers’ guide, evaluate and choose the optimal IDaaS solution for your organization. The guide is organized by the key capabilities you should consider when evaluating an IDaaS solution and includes important questions to ask your IT partner or vendor to determine if their offering will meet your needs.
Posted: 02 Aug 2021 | Published: 19 Aug 2021

CyberArk Software, Inc

Increase In Conversion After Switching To Onfido
sponsored by Onfido
CASE STUDY: Learn how Onfido’s Document and Biometric Verifications has simplified Genome’s onboarding process and allowed their customers to snap a selfie video on their smartphones, rather than upload pictures via a computer.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

More Users Verified And Onboarded
sponsored by Onfido
CASE STUDY: In this case study, learn how Onfido allowed Bunq to easily detect impersonation and onboard users without the need for a video call.
Posted: 29 Mar 2021 | Published: 29 Mar 2021

Onfido

Increase In Customer Conversion
sponsored by Onfido
CASE STUDY: MACH is a digital-first bank allowing customers to bank from their smartphone. With the goal of increasing customers, this bank has to onboard at a rapid pace while still preventing fraud and without compromising on compliance. Examine this case study to learn how Onfido’s platform helps MACH to securely onboard at scale.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Onfido

How to detect the 7 types of document and identity fraud
sponsored by Onfido
WHITE PAPER: Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Onfido

A catalyst for change
sponsored by Onfido
EBOOK: Biometrics offer an additional later of security to identify customers but come with a host of privacy and ethical concerns that must be addressed. In this security newsletter, “The Future of Authentication,” experts debate the pros and cons, debunk common myths, and get into the ethics of biometrics. Open the PDF to get started.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Onfido

Auth0’s Approach to Information Security Identity in the Real World: the Tao of Extensibility
sponsored by Auth0
WHITE PAPER: Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Auth0

Mistakes To Love: A Survey of Identity Mistakes
sponsored by Auth0
WHITE PAPER: For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

Uniquely You: Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Onfido

Evaluating Identity Verification Solutions
sponsored by Onfido
RESOURCE: When evaluating an Identify and Access Management system, there are many criteria to look out for. Download this interactive checklist to help you.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Onfido

Financial Services, Fraud and the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today, identifiers and regulations such as Know Your Customer (KYC) are raising new challenges for smooth and secure onboarding. In this white paper, learn about identity verification best practices, such as biometrics, that can help your organization keep up with the changing landscape of identity theft and fraud.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Onfido

Computer Weekly – 10 July 2018: Tackling the digital identity problem
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.
Posted: 09 Jul 2018 | Published: 09 Jul 2018

ComputerWeekly.com

Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.
Posted: 17 Oct 2021 | Published: 19 Oct 2021

ComputerWeekly.com

Identity and Access Management Tools to Look Out For
sponsored by Okta
ESSENTIAL GUIDE: Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.
Posted: 05 Apr 2019 | Published: 01 Apr 2019

Okta

Crafting an Identity-Based Security Strategy for Cloud
sponsored by Hewlett Packard Enterprise
EGUIDE: IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Hewlett Packard Enterprise

How to Craft SSO and IAM Strategies on the Cloud
sponsored by OneLogin
EGUIDE: Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.
Posted: 11 Jul 2016 | Published: 05 Jul 2016

OneLogin

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM
1 - 25 of 37 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences