IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 500 Matches Previous Page  |  Next Page
2018 Identity and Access Management Index Report
sponsored by Gemalto
RESEARCH CONTENT: According to the Identity and Access Management Index, 90% of respondents admit that their organization's security policies around access management have been influenced by breaches of consumer services. Take a look at this report to learn about where organizations stand in terms of IAM and how they plan to augment security in the near future.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Gemalto

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Simplifying Fraud Analytics
sponsored by SAS
WHITE PAPER: According to SAS, as losses continue to grow, detecting and preventing fraud is consistently ranked among the top three investment and strategic priorities for insurance executives. Explore this resource to uncover 10 steps to detecting and preventing insurance fraud.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Protect the Integrity of the Procurement Function
sponsored by SAS
WHITE PAPER: The procurement process is extremely complex and as a result, fraud detection is challenging. Take a look at this resource to uncover trends and best practices in detecting and preventing global procurement fraud.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

SAS

Banking Across Generations Study
sponsored by Jumio
WHITE PAPER: According to Javelin Strategy and Research, 20% of individuals who have abandoned mobile banking blame it on the authentication process being time consuming. Take a look at this resource to gain insight into improving authentication and security within mobile banking, while ensuring a smooth customer experience.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Jumio

A Buyer's Guide to Online Identity Verification
sponsored by Jumio
WHITE PAPER: Because of cybercriminals and routine data breaches, trust is in increasingly short supply. This resource reveals how to evaluate vendors in the emerging trusted identity as a service space.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Jumio

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

HYPR

The Explosion of Account Takeovers
sponsored by ConvergeOne
RESOURCE: There were 519 million exposed credentials in 2017 with weak or no encryption, according to SpyCloud researchers. Explore this resource to gain insight into the underground market for account takeover attacks.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

ConvergeOne

Improving IAM in Today's Connected Enterprise
sponsored by Entrust, Inc.
WHITE PAPER: Instead of relying on dated measures, organizations can make authentication practices more robust by incorporating mobile devices into the mix. Explore this resource to gain insight into leveraging mobile devices to enhance authentication security as well as augment IAM approaches overall.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

Entrust, Inc.

Authentication-as-a-Service Improved
sponsored by Entrust, Inc.
WHITE PAPER: How are you securing your enterprise and dealing with authentication protocols? This resource offers an authentication-as-a-service strategy to aid your enterprise in improving its IAM security approach.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

Entrust, Inc.

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Security for Containers – 5 Things DevOps Need to Do
sponsored by Aqua Security
WHITE PAPER: For security departments, adoption of containerization presents a multifaceted challenge. This resource reveals 5 things DevOps should know about securing containerized applications.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Aqua Security

The Future is Decentralized
sponsored by HYPR
WHITE PAPER: According to the Verizon DBIR, 80% of hacking related breaches are the result of weak or stolen passwords. But large scale data breaches are avoidable. This white paper details why decentralized authentication is the way forward for enterprises wanting to solve this critical security challenge.
Posted: 01 Mar 2018 | Published: 01 Mar 2018

HYPR

Creating a Single View of Digital Forensics Data
sponsored by Nuix
WHITE PAPER: This industry perspective covering government and forensics explores how a "single pane of glass" approach empowered by powerful data analytics technologies, can help organizations achieve better and faster business results, in a world that's increasingly driven by digital information.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Nuix

Top 5 Database Security Threats
sponsored by Imperva
WHITE PAPER: According to the Verizon DBIR, hackers are motivated by financial gain, espionage, ideology or grudge, and even fun. This white paper examines the top 5 database security threats and explains how risk-sensitive organizations must remain a step ahead in their security posture.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Preparing Your Organization for the GDPR
sponsored by Imperva
WHITE PAPER: Where does your organization stand in terms of GDPR preparedness? Access this resource to uncover 5 questions to determine what GDPR means for your organization and how to prepare.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Imperva

The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Getting Started With Attribute Based Access Control
sponsored by Axiomatics
WHITE PAPER: How are you protecting access to your most critical assets? Explore this white paper to gain insight into attribute based access control (ABAC) and uncover 3 major steps to deploying an effective program.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

2018 Gambling Security Report
sponsored by iovation, Inc.
RESOURCE: 2017 marked the first year in which iOS had the largest share of gambling transactions. With the online gaming market booming, cybercriminals are finding ways to target personal data. Utilize this guide to learn how to prepare for unconventional attacks, prevent fraud, and adhere to regulations within the online gaming industry.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

iovation, Inc.

Security's Identity Crisis: Are You Overlooking The #1 Attack Vector?
sponsored by Centrify Corporation
WHITE PAPER: According to Gemalto's Breach Level Index Report, breaches were up 164% in 2017. This e-book explores security's identity crisis, helps you assess your current security approach, and offers a method to strengthen your company's identity controls.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Centrify Corporation

The Right Way to Prove Identity and Establish Trust
sponsored by One Identity
RESOURCE: Passwords provide assurance of identity, but they can be easily compromised. This resource reveals a strategy to proving the identity of individuals in a transaction or exchange of personal information.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Top 5 Questions to Ask Before Purchasing a Two-Factor Authentication Solution
sponsored by One Identity
RESOURCE: With the multitude of two-factor authentication programs available in the market today, how do you know which one is right for your organization? This resource offers 5 questions to ask before selecting and implementing a two-factor authentication strategy.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

The City of Frankfurt Enables Work from Home with Two-Factor Authentication
sponsored by One Identity
CASE STUDY: Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.
Posted: 12 Feb 2018 | Published: 31 Dec 2015

One Identity
1 - 25 of 500 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement