Software  >   Systems Software  >   Security Software  >  

Identity Management Software

RSS Feed   
ALSO CALLED: ID Management
DEFINITION: Software that manages the technology that oversees a user's access to applications and networks within an enterprise, rather than who the user is.
Identity Management Software Reports
1 - 25 of 237 Matches Previous Page  |  Next Page
The Identity Experience: How Identity Creates Great UX
sponsored by Onfido
RESOURCE: Enterprises strive for great UX, but where many tend to miss the mark is through a lack of identity verification. Adding identity can create benefits such as more efficient onboarding and improved ease of use, which translate into less drop-off and more conversion. To read further, access this guide outlining Onfido’s Identity Verification.
Posted: 08 Mar 2021 | Published: 08 Mar 2021

Onfido

Retiring Web Access Management (WAM)
sponsored by Okta
DATA SHEET: Many organizations have adopted web access management (WAM) solutions to secure access to web applications on-premises. But with the emergence of SaaS, mobile apps and IaaS, enabling access to all systems and users has broken the WAM security model. Take a look at this data sheet to learn how to modernize identity management.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta

Universal Directory: Create One World.
sponsored by Okta
EBOOK: Directories have helped businesses manage identities, but the more identities there are to manage, the more directories are born, and the more confusion arises. Dive into this e-book to learn more about directories, then discover a central identity management system by Okta that strives to integrate users across different organizations.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta

Burdens of Homegrown Customer Identity that Hinder Digital Transformation
sponsored by Okta
WHITE PAPER: When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Okta

Use Group Rules to Automate & Granularly Manage Access
sponsored by Okta
WEBCAST: Organizations using Okta for IAM know the importance of groups. But managing these groups is a hassle for admins, and it becomes more complicated as the number of users or groups increases, leading to security risks. Watch this webinar to learn how to you can use Okta’s Group Rules to automate app assignments and enforce granular access.
Posted: 01 Mar 2021 | Premiered: Mar 1, 2021

Okta

Cybereason Video 2 – Live Attack Simulation
sponsored by Cybereason
WEBCAST: Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.
Posted: 26 Feb 2021 | Premiered: Feb 26, 2021

Cybereason

Cisco Umbrella – SASE in 15 Minutes
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Why Citrix Workspace is a Better Choice than VPN for Today’s Remote Workforce
sponsored by Citrix
RESOURCE: VPNs have been the security solution of choice for a long time, but they do not hold up for remote work. They’re complex to manage, and they introduce network-level security risks. They also provide a poor user experience and are neither scalable nor privacy-friendly. View this solution brief to see why Citrix Workspace may be a better choice.
Posted: 26 Feb 2021 | Published: 30 Oct 2020

Citrix

SASE & Zero Trust for Dummies
sponsored by VMware
EBOOK: Already, SASE is playing a big role in conversations about how to improve remote security and increase network efficiency. Now, zero-trust network access (ZTNA) can provide a user’s contextual identity to all the different SASE security services, making for a smarter, more secure edge. Download SASE & ZTNA For Dummies to learn more.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

VMware

Eighth Annual Fraud Report
sponsored by IDology
RESEARCH CONTENT: Like changes in the market, cyberthreats evolve and change each year – especially with threats like fraud. This research report from IDology highlights how fraud evolved in 2020 and provides key insight into how events like COVID impacted fraud. Read on to unlock the full report.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

IDology

Rethinking Reliance on Active Directory
sponsored by Okta
DATA SHEET: In the late 90s and early 00s, Active Directory (AD) was the primary method for identity management, and it worked well. However, times have changed, and so have identity needs and IT ecosystems. It’s time to rethink AD – read this data sheet to get started.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

Four Next-Generation Endpoint Security Enhancements
sponsored by Fortinet, Inc.
EBOOK: Today’s endpoints are at their most vulnerable. IT infrastructure leaders need to integrate networking and security to protect endpoints, minimize the operational impact associated with the expanding attack surface and allow their teams to scale. Dive into this e-book to uncover 4 requirements for endpoint protection.
Posted: 12 Feb 2021 | Published: 21 Oct 2020

Fortinet, Inc.

Enable & Secure Your Remote Workforce
sponsored by BeyondTrust Corporation
EGUIDE: IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

BeyondTrust Corporation

The Guide To Just-In-Time Privileged Access Management
sponsored by BeyondTrust Corporation
EGUIDE: Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BeyondTrust Corporation

Why IT Directory Issues Should No Longer Be Viewed as the Cost Of Doing Business
sponsored by Okta
VIDEO: Identities are at the foundation of how an organization monitors and protects access to critical data – as a result, finding ways to secure and manage these identities becomes critical. In this short video, discover how IT directories can be used to support these initiatives – watch now to get started.
Posted: 04 Feb 2021 | Premiered: 04 Feb 2021

Okta

CyberArk Privileged Access Security for U.S. Federal Government Agencies
sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International

Computer Weekly Buyer's Guide: Identity and Access Management
sponsored by ComputerWeekly.com
EGUIDE: When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring largecompanies, the implications of cloud and how to pick the right service for your firm.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

ComputerWeekly.com

Key Considerations for Delivering Secure Unparalleled Remote Access
sponsored by Citrix
EBOOK: As companies scale, they add solutions leaving employees with multiple gateways or access points to get to their apps and data. It creates a poor user experience, slows productivity and creates security risks. Download this e-book to see how Citrix Workspace can help IT simplify remote access connections while maintaining security and control.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Citrix

Market Guide for Zero Trust Network Access
sponsored by Akamai Technologies
WHITE PAPER: If your organization is looking to augment its VPN or even pilot a SASE strategy to rapidly expand remote access, then you’ve probably heard about zero-trust network access (ZTNA). In this Gartner market guide, explore key findings about ZTNA, recommendations for security and risk leaders and a list of representative vendors of ZTNA.
Posted: 26 Jan 2021 | Published: 08 Jun 2020

Akamai Technologies

A Risk-Based Approach to Insider Threat Detection for Federal Government Agencies
sponsored by Merlin International
WHITE PAPER: Malicious insiders, regardless of motive, continue to establish themselves as a major threat, especially amongst United States federal government agencies. This white paper offers comprehensive insights into the role of privileged access management as an effective countermeasure against insider threats – read on to get started.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

Manage Secrets throughout DevSecOps with Red Hat and CyberArk
sponsored by Red Hat
VIDEO: Emphasizing security throughout DevOps, also known as DevSecOps, has become a common practice across organizations. This webinar highlights how identity and access management (IAM) can fit into the software development lifecycle – watch this webinar to explore the role of IAM in DevSecOps.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

Using Online Identities in Professional Investigations
sponsored by Pipl
WHITE PAPER: As interactions have become more and more digital, online identities have emerged to replace the traditional notion of a user identity. Read this white paper to learn more about the changing nature of identity and how Pipl leverages online identity data to enhance investigations into today’s cyberthreats.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

OAuth and OpenID Connect - What's Next?
sponsored by Curity AB
WEBCAST: The OAuth 2.0 framework has provided identity professionals open standards for authenticating users, but the world is now mobile, and the way apps are being built is changing. OpenID Connect by Curity is an identity layer on top of the current OAuth protocol that is API-ready for a remote workforce. Watch this webcast to see why this matters now.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

Curity AB
1 - 25 of 237 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info