Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed   
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software Reports
1 - 25 of 251 Matches Previous Page  |  Next Page
Streamlining Onboarding and Offboarding Processes with Ivanti Identity Director
sponsored by Ivanti
CASE STUDY: Province Groningen in the Netherlands had been using a self-developed solution for employee onboarding, changes and offboarding. The system was already time-consuming, and after a while, it could no longer support these processes. Peruse this case study to understand how this province was able to secure a more efficient and effective solution.
Posted: 30 Nov 2020 | Published: 28 Feb 2019

Ivanti

Cloud Security Architecture for Zero Trust
sponsored by McAfee
WEBCAST: In today’s vulnerable world, access control with context through zero trust has given organizations the ability to allow access based on behavior. But what implications does this hold for cloud security? How does it affect user experience? Access this webinar to learn answers to these questions as well as zero-trust cloud security architecture.
Posted: 30 Nov 2020 | Premiered: Nov 30, 2020

McAfee

Extreme Networks Special Edition Cloud-Managed Network Access Control (NAC)
sponsored by Extreme Networks
EBOOK: Today, an ever-growing number of corporate and guest devices need to be securely onboarded and provisioned with the access rights appropriate for their roles. IT security departments need to address these challenges cost-efficiently. In this “for dummies” e-book, learn how cloud-managed network access control (NAC) can help.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Extreme Networks

Mattress Firm: Security and innovation
sponsored by Ivanti
CASE STUDY: As enterprises grow, their competitive advantage relies on their ability to innovate. However, too often, IT teams are spending their effort on tedious, manual tasks, limiting their time to innovate. Read this case study to learn how Mattress Firm, through their partnership with Ivanti, were able to address this issue.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Ivanti

NTT Ltd. and Palo Alto Networks – Secure Access Ecosystem
sponsored by NTT
DATA SHEET: Today’s businesses have to address a rapid increase in mobile workers, the sudden need for additional branch offices, cloud adoption, data security needs and the growing enforcement of governance, risk and compliance laws. How can they handle all these challenges? View this data sheet to see how NTT and Palo Alto Networks may be able to help.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

NTT

Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

Zero Trust Network Access
sponsored by VMware, Inc.
EBOOK: VMware Secure Access provides enterprises a way for their employees to leverage a secure and fast connection to cloud-based applications and corporate technical resources. Read the e-book to get the full details.
Posted: 20 Nov 2020 | Published: 31 May 2019

VMware, Inc.

The Online Retailer’s Guide to Higher Profitability
sponsored by Cloudflare and Queue IT
EBOOK: Retailers are preparing for the upcoming holidays, the most lucrative time of the year for online shopping. If you haven’t already begun capacity planning or upgrades to your online store infrastructure, there’s still time to get ready. View this guide to see a checklist to make sure your online store is ready for the holidays.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cloudflare and Queue IT

Leveraging Ivanti to Accelerate Time to Value at a Lower Cost
sponsored by Ivanti
CASE STUDY: When considering an operational upgrade, banks must take deliberate precautions to ensure they’re adhering to regulatory requirements. This case study overviews Woodforest National Bank’s journey towards an improved IAM program, highlighting their key challenges and how they partnered with Ivanti to overcome them.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Ivanti

Success from the Start: Top Tips For Beginning An ID Badge Or Card Program
sponsored by HID Global
EBOOK: For organizations embarking on an ID badge/card program there are a number of key implementation steps and often overlooked – but vital – considerations to make to ensure success from the start. This eBook provides insight into these planning considerations, and more – read on to unlock your copy.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

Fargo® Ink1000
sponsored by HID Global
DATA SHEET: Classrooms, offices and stores are beginning to open their doors again, and employees need an effective, secure and reliable card printer for their return to business as usual. Introducing the HID FARGO® INK1000desktop-based card printer. Read this data sheet to learn more about the Fargo Ink1000 Inkjet card printer from HID.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

Building a Basis of Trust and Transparency
sponsored by Onegini
CASE STUDY: When the Netherlands’ oldest independent wealth manager took steps towards the future, they did so with great consideration for their clients’ best interests. They explored ways to serve their clients with mobile apps, which factored in IAM. View this case study to see how Van Lanschot was able to secure a robust mobile IAM platform.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Onegini

The Key To Successful Digital Transformation In Banking
sponsored by Onegini
WHITE PAPER: In order to compete with FinTechs, banks need to rethink their digital presence to ensure a secure and user-friendly experience. But digital transformations are far from simple. This helpful guide explores some of the challenges of going digital, as well as an overview of their Onegini’s Identity Cloud offering – read on to get started.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Onegini

Key IAM Automation Policies and Controls for Stronger Governance
sponsored by Hitachi Vantara
RESOURCE: Colleges and universities need a flexible IAM solution that can keep users secure and systems compliant. Still, many schools stick with manual homegrown, legacy systems believing they’re the only way to ensure both flexibility and security. But there’s a simpler way. Read this short article to learn 3 key policies for IAM automation.
Posted: 12 Nov 2020 | Published: 15 Sep 2020

Hitachi Vantara

The Role of Biometrics in Multi-Factor Security
sponsored by BIO-key International
EGUIDE: Biometrics offers organizations an additional method of authentication – therefor adding to their security. However, there are limitations to consider. Read this e-guide for a closer look at these concern areas and how to address them.
Posted: 12 Nov 2020 | Published: 28 Oct 2020

BIO-key International

Two-Factor Authentication is Broken: What Comes Next?
sponsored by BIO-key International
EGUIDE: The philosophy behind two-factor or multi-factor authentication (2FA/MFA) has been to authenticate a device rather than an identity. For many reasons, this loose ‘identity approximation’ method will not hold up in the long run. To learn more, study our expert guide Two-Factor Authentication is Broken: What Comes Next?
Posted: 12 Nov 2020 | Published: 29 Oct 2020

BIO-key International

Identity Cloud for Regulated Industries
sponsored by Onegini
WHITE PAPER: As companies in regulated industries move their businesses online, they must secure all digital identity as well as identify and authenticate users. Read this brochure to learn how Onegini Identity Cloud can help to simplify the registration, identification, authentication and lifecycle management of your customers, agents and brokers.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Onegini

CIAM as a Fundament to Enable Digital Initiatives Within Baloise
sponsored by Onegini
CASE STUDY: An acclaimed Swiss financial services company was aiming to implement a B2C identity and access solution for customers in Belgium, a traditionally broker-oriented market. They needed to focus on both the prevention of identity theft attacks and tougher regulations for consumer protection. View this case study to learn the result of their efforts.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Onegini

IAM Automation: The Secret to Governance and Cybersecurity Success in Higher Ed
sponsored by Hitachi Vantara
RESOURCE: Remote and hybrid learning models require increased remote access – underlining the importance of effective IAM security and governance. But how can schools keep up with the growing number of remote devices? Automation. Read this article to learn how to incorporate IAM automation into higher ed institutions.
Posted: 11 Nov 2020 | Published: 08 Sep 2020

Hitachi Vantara

IAM Automation Controls Prevent the Risks in Higher Education
sponsored by Hitachi Vantara
RESOURCE: Higher education institutions face a unique set of identity and access management (IAM) challenges – namely finding and mitigating risks related to orphan and dormant accounts. Read this article to learn about how IAM automation controls can address these risks.
Posted: 11 Nov 2020 | Published: 30 Sep 2020

Hitachi Vantara

How to Easily and Securely Implement MFA for Web and Web App to Protect Social Data
sponsored by Onegini
WHITE PAPER: As online services expand and high-security transactions increase, organizations are urged to strengthen their existing online portals and apps with an MFA solution to safeguard particularly sensitive transactions. But implementing this technology can be a difficult task. Read this white paper to learn how to easily and securely implement MFA.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

Onegini

Thales’ SafeNet Trusted Access Brings Security To Access And Authentication
sponsored by Thales
PRODUCT REVIEW: Selecting an identity and access management (IAM) tool that balances functionality with security can be difficult. This product review, written by third-party cybersecurity expert David Strom, provides a comprehensive overview and assessment of Thales’ SafeNet Trusted Access tool – read on to see what Strom has to say.
Posted: 06 Nov 2020 | Published: 31 Jan 2020

Thales

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

GARANCY Password Management
sponsored by Beta Systems
PRODUCT OVERVIEW: Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems
1 - 25 of 251 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info