IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 547 Matches Previous Page  |  Next Page
solarisBank & Identity Management
sponsored by IDnow GmbH
CASE STUDY: solarisBank is a digital Banking-as-a-Service platform that allows companies to offer their own financial products. To remain regulatory, this emerging fintech company needed an identity solution that could verify customers via video and provide compliant e-signing capabilities. View this case study to see how IDnow was able to help.
Posted: 30 Oct 2020 | Published: 30 Oct 2020

IDnow GmbH

Best Practices for Deploying Enterprise Single Sign-On (SSO)
sponsored by BIO-key International
EGUIDE: The number one consideration when embarking on single sign-on (SSO) deployment initiative is to understand the size and scope of the project. This 5-page e-guide highlights common challenges and offers best practices as they relate to deploying enterprise-wide SSO – read on for your copy.
Posted: 30 Oct 2020 | Published: 27 Oct 2020

BIO-key International

How to Get Ready for the New Regulations in the Gaming Industry
sponsored by IDnow GmbH
WHITE PAPER: Gaming regulations across Europe are changing to make online gambling safer for users. These new regulations may require substantial changes to identity verification in order to remain compliant. Dig into this white paper to learn what these change means for identity & compliance and to understand what your identity partner needs to provide.
Posted: 30 Oct 2020 | Published: 30 Oct 2020

IDnow GmbH

Top Security and Risk Management Trends
sponsored by Trend Micro
ANALYST REPORT: Digital business transformation for security has taken full flight for reasons out of our control, but which technologies are enterprises gravitating toward the most? What challenges are driving security leaders toward said technologies? Follow the trends – browse this article to learn top security and risk management trends from Gartner.
Posted: 30 Oct 2020 | Published: 27 Feb 2020

Trend Micro

7 Best Practices for Enabling & Securing Remote Work
sponsored by CyberArk Software, Inc
EBOOK: In order to achieve flexibility, remote workers are using unmanaged personal devices to conduct work. However, with this increased flexibility comes new securitychallenges that require modern solutions. This eBook highlight these challenges and offers 7 best practices for enabling and securing remote work – read on to get started.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

CyberArk Software, Inc

Protecting Privileged Access in DevOps & Cloud Environments
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access credentials are an especially attractive target amongst cybercriminals – putting DevOps and cloud environments at great risk. This research report was written to help CISOs and security leaders address these challenges by highlighting key attack types and specific risks targeting these environments.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

CyberArk Software, Inc

Efficient and powerful today. Ready for tomorrow.
sponsored by IDnow GmbH
EGUIDE: Given the spike in both volume and severity of modern cyberthreats, it’s no surprise to see AI-powered security capabilities become more popular to prevent fraud, meet compliance requirements, and more. Read this e-guide to learn about AI-powered identity verification & why so many organizations are embracing it.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

IDnow GmbH

Cost of Insider Threats: Ponemon Global Report
sponsored by IBM
ANALYST REPORT: The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.
Posted: 29 Oct 2020 | Published: 26 Aug 2020

IBM

Getting Started with the HID® FARGO® INK1000
sponsored by HID Global
RESOURCE: Having reliable, easy to use access cards is a key component of your employees’ day-to-day life. Read on to learn how you can print better ID and access cards.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

HID Global

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

Beyond Identity and Ping Identity Solution Brief
sponsored by Beyond Identity, Inc.
DATA SHEET: With the increase in both cloud application use and remote work, creating and scaling access management controls is growing more complex. Read up on a new partnership that is working to solve this problem by delivering passwordless authentication, improved end-user experience, risk-based authorization and reduced IT costs and overhead.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Beyond Identity, Inc.

TeleDoctor24 - The Digital Doctor’s Visit Powered by IDnow
sponsored by IDnow GmbH
CASE STUDY: As visits to the doctor’s office are becoming a much greater health risk than before, telehealth visits are proliferating. But in order for these virtual visits to be legal and compliant, patients must sign a bevy of documents, and this is no easy feat. Read this case study to learn how IDnow is helping practices get these documents e-signed.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

IDnow GmbH

6 Key Identity and Access Management (IAM) Benefits
sponsored by BIO-key International
EGUIDE: Identity and access management (IAM) has become one of the most effective ways to provision, manage and secure access to an organizations sensitive data. In this e-guide, 6 Key Identity and Access Management (IAM) Benefits, discover 6 observable benefits that users, admins and organizations can realize with an effective IAM program.
Posted: 28 Oct 2020 | Published: 26 Oct 2020

BIO-key International

Securing Privileged Access and Identities In 4 Key Cloud Scenarios
sponsored by CyberArk Software, Inc
CASE STUDY: As cloud usage expands, so too do the number of users and apps with privileged access – which can lead to risk if not managed properly. This exclusive resource from CyberArk Software examines 4 use cases which highlight best practices in securing privileged access and identities for your infrastructure and applications in the cloud.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

CyberArk Software, Inc

Financial Services
sponsored by Hitachi ID
PRODUCT OVERVIEW: Given increasingly stringent compliance mandates within the financial industry, it’s no surprise that managing risk and maintaining compliance are top of mind – especially when it comes to authentication or IAM programs. Read this solution brief to see how Hitachi ID is helping financial organizations meet their privacy and compliance needs.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Hitachi ID

5 Biggest IAM Security Oversights
sponsored by BIO-key International
EGUIDE: Identity and access management (IAM) plays a crucial role in provisioning user access to entities, especially as organizations continue to move to the cloud. Read this e-guide for the 5 biggest security oversights in IAM configurations and discover the most effective ways to avoid them.
Posted: 27 Oct 2020 | Published: 23 Oct 2020

BIO-key International

Maintaining Business Momentum In The Face Of Forced Change: The Active Directory Angle
sponsored by Quest
WHITE PAPER: With the frantic pace of today’s business world, organizations struggle to keep up with requests to create, change and remove access to their on-premises AD. This scenario becomes even more complicated when you mix in a hybrid AD environment. Read this white paper to learn why properly-tuned AD lifecycle management is crucial for handling change.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Quest

The Best of Both Worlds: Hybrid IAM Offers Flexibility and Enhanced Security
sponsored by Quest
WHITE PAPER: Within the identity and access management (IAM) market, the cloud segment is experiencing significant growth – especially among distributed workforces. This white paper discusses how cloud has shaped the IAM market and the benefits of cloud/hybrid IAM offerings.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Quest

Remote Work & the IAM Market
sponsored by BIO-key International
EGUIDE: As remote workforces increase in size, so too does the need to effectively manage and provision user access to critical data, applications and devices. In this e-guide, discover how the remote work boom has changed the identity and access management (IAM) market.
Posted: 27 Oct 2020 | Published: 23 Oct 2020

BIO-key International

Beyond Identity and Okta Solution Brief
sponsored by Beyond Identity, Inc.
PRODUCT OVERVIEW: Password-based authentication methods and a thing of the past. This solution brief explores the partnership between Beyond Identity and Okta, highlighting how they are working together to help organizations eliminate passwords, improve user experience, reduce IT costs, and more – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER: Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020

Cysiv

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: In the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Build a Solutions-Driven Culture with a Modern Identity
sponsored by Hitachi ID
DATA SHEET: Educational institutions must always invest where they’ll see the biggest impact. Digital identity, connecting students and staff to information that builds knowledge, is an opportunity for pivotal efficiency gains – but the hardest part of identity is management. View this data sheet to learn strategies for campus-wide identity management.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Privileged Access in Healthcare
sponsored by Hitachi ID
DATA SHEET: The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and disruption to healthcare delivery at worst. Because of this high risk, healthcare organizations need to carefully manage privileged access. View this data sheet to learn more.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID
1 - 25 of 547 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info