Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed   
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software Reports
1 - 25 of 144 Matches Previous Page  |  Next Page
IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

What Hackers Know That You Don't
sponsored by Evident
WHITE PAPER: Companies such as LinkedIn, Uber and Equifax have all been victims of significant data hacks. In this white paper, uncover some basics of how breaches happen and where data travels when they do, as well as how you can strengthen security protocols to prevent breaches in the future.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

Is Your Software Simple? Assess How Well the PAM Software You Choose Supports Your Goals
sponsored by Thycotic
RESOURCE: Is the Privileged Access Management (PAM) software you chose right for your business? Take this simple test to find out.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Thycotic

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk
sponsored by One Identity
VIDEO: In this webinar, take a look at the top 5 ways for analyzing account entitlements and learn how areas of risk can be identified before a user (or cybercriminal) can abuse their access.
Posted: 23 Aug 2018 | Premiered: 20 Aug 2018

One Identity

Regulating Privileged Access: Leveraging the Human Factor for Better Security
sponsored by One Identity
WHITE PAPER: In nearly every recent high-profile breach, lapses in privileged account management has been exploited. Learn how human approval can prevent hackers from accessing your privileged accounts.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

One Identity

Is Biometrics the Future of Security?
sponsored by One Identity
EBOOK: Biometrics is the automated recognition of individuals based on their behavioral and biological characteristics. Learn why it's important to your business's security and why passwords may not be unique enough anymore.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

International Retailer Eliminates AD Issues with Active Roles
sponsored by One Identity
CASE STUDY: Learn how this Denmark-based international home goods retailer brought security and efficiency to its Active Directory infrastructure.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

KuppingerCole Report Executive View: One Identity Safeguard
sponsored by One Identity
ANALYST REPORT: Download this white paper to learn about a privileged management platform and how it can help you manage security risks associated with the use of privileged accounts in an organization.
Posted: 21 Aug 2018 | Published: 31 Jul 2018

One Identity

Two-Factor Authentication That Makes Users and IT Security Happy
sponsored by One Identity
WHITE PAPER: Download this white paper to learn about One Identity, an identity and access management tool that uses a set of factors to assess the risk a given access attempt represents, and respond with appropriate security measures.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

OneLogin

Top Trends Shaping IAM In 2018 Landscape: The Identity And Access Management Playbook
sponsored by OneLogin
ANALYST REPORT: In this Forrester report, explore several trends that will have an impact of IAM budgets, skills, priorities, architectural decisions, the vendor landscape, and deployment options.
Posted: 26 Jul 2018 | Published: 09 Jan 2018

OneLogin

The Essentials: Privileged Access Management
sponsored by HelpSystems
WHITE PAPER: Find out how you can effectively control and protect privileged UNIX and Linux accounts using centralized access management.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

Transform Business Processes with Electronic and Digital Signatures
sponsored by Adobe Inc
WHITE PAPER: Discover how e-signatures provide advanced security measures to ensure your docs are as safe as they are compliant, especially with regard to growing domestic and international regulations. Plus find out the difference between e-signatures and digital signatures and how one solution may be the cost-effective answer for your business.
Posted: 07 May 2018 | Published: 30 Nov 2017

Adobe Inc

What is Multi-factor Authentication?
sponsored by HID Global
VIDEO: Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.
Posted: 19 Oct 2017 | Premiered: 19 Oct 2017

HID Global

VPN Access Made Easier Without Sacrificing Security
sponsored by HID Global
JOURNAL ARTICLE: VPNs create a secure tunnel between company data and employee devices, however they don't protect against weak passwords. Access this resource to learn how to increase the security of the VPN and maintain usability.
Posted: 21 Sep 2017 | Published: 15 Aug 2017

HID Global

Four Myths About Credential Phishing You Can't Ignore
sponsored by Okta
WHITE PAPER: Successful phishing prevention starts with placing identity at the center of your security strategy. In this white paper, find out why phishing can be more dangerous to organizations than a malware attack, common misconceptions, and 4 myths about credential phishing you can't ignore.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Okta

Report – Market Guide for Privileged Access Security Management
sponsored by CA Technologies
ANALYST REPORT: In Gartner market guide for privileged access security management, learn about 24 vendors in this competitive and rapidly maturing market.
Posted: 26 Jul 2018 | Published: 22 Aug 2017

CA Technologies

Integrating IAM into your Digital Workspace
sponsored by Citrix
EGUIDE: Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
Posted: 30 May 2018 | Published: 24 May 2018

Citrix

The Changing Face of Privileged Access Management
sponsored by One Identity
VIDEO: Hear from Kelly Hardy and Tyler Reese from One Identity about the importance of privilege access management (PAM) and how you can maintain frictionless security for your organization.
Posted: 18 May 2018 | Premiered: 15 May 2018

One Identity

Is Your Organization Prepared for GDPR?
sponsored by One Identity
RESOURCE: Review the 4 pillars of protection outlined by the EU GDPR, and a checklist that can help you understand where your organization stands with the regulation.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

Identity Analytics: A More Comprehensive Defense in the Battle to Reduce Risk and Enhance Security
sponsored by One Identity
RESOURCE: This resource focuses on "entitlement bloats" that may be putting your organization at risk for undetectable bad actors and threats. Learn how to reduce your attack surface by eliminating unnecessary or dormant entitlements before someone can abuse or exploit them.
Posted: 11 May 2018 | Published: 29 Dec 2017

One Identity

Regulating Privileged Access: Leveraging the Human Factor for Better Security
sponsored by One Identity
WHITE PAPER: 81% of data breaches involve the misuse of privileged credentials, according to the Verizon DBIR. This white paper examines how privileged access management (PAM) can help reduce the risk associated with privileged accounts.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

The Breach Prevention Playbook: Simple Ways to Get IAM Right and Protect Your Organization
sponsored by One Identity
RESOURCE: Explore the IAM practices and technologies that provide the best path to cybersecurity that can bolster your chances of surviving and enable your organization to emerge with minimal damage.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

The City of Frankfurt Enables Work from Home with Two-Factor Authentication
sponsored by One Identity
CASE STUDY: Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.
Posted: 12 Feb 2018 | Published: 31 Dec 2015

One Identity

Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015

Axiomatics
1 - 25 of 144 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement