IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 555 Matches Previous Page  |  Next Page
Managing User Risk: A Review of LogRhythm Cloud AI for User and Entity Behavior Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: SANS analyst and cybersecurity professional, Dave Shackleford, takes an in-depth look at user and entity behavior (UEBA) solutions that take advantage of machine learning intelligence capabilities.
Posted: 09 Aug 2018 | Published: 28 Feb 2018

LogRhythm, Inc.

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 03 Aug 2018 | Published: 31 Oct 2016

IBM

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 02 Aug 2018 | Published: 31 Oct 2016

IBM

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control.
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

Protect your Organization: Know your Users and Data
sponsored by IBM
WHITE PAPER: Your organization will face many threats – but does it have the tools to deal them? Download this resource to protect yourself and your organization from insider threats and attacks and save your business from suffering the damage.
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

Design an Identity and Access Management Program Optimized for your Business
sponsored by IBM
WHITE PAPER: Put your current identity and access management (IAM) program to the test. Find out how your business can benefit from an IAM program that can help enable productivity and collaboration, ensure regulatory compliance is achieved, reduce the costs of performing audits, and more.
Posted: 31 Jul 2018 | Published: 31 Jul 2016

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESEARCH CONTENT: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM

Design an Identity and Access Management Program Optimized for your Business
sponsored by IBM
WHITE PAPER: Put your current identity and access management (IAM) program to the test. Find out how your business can benefit from an IAM program that can help enable productivity and collaboration, ensure regulatory compliance is achieved, reduce the costs of performing audits, and more.
Posted: 30 Jul 2018 | Published: 31 Jul 2016

IBM

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 30 Jul 2018 | Published: 21 Feb 2018

IBM

Case Study: Node Africa Transforms Security
sponsored by VMware
CASE STUDY: It's not easy to navigate the dangers of the digital economy – it has caused a dramatic shift in the IT landscape, yet many IT organizations are still taking the same approach to security. This case study highlights a cloud service provider in Kenya secured their application infrastructure and streamlined compliance.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

VMware

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

OneLogin

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

Best Practices for Secure Authentication
sponsored by IBM
WHITE PAPER: Learn how your organization can establish a path to stronger authentication and choose an approach that balances both security and business needs.
Posted: 26 Jul 2018 | Published: 30 Jun 2017

IBM

Top Trends Shaping IAM In 2018 Landscape: The Identity And Access Management Playbook
sponsored by OneLogin
ANALYST REPORT: In this Forrester report, explore several trends that will have an impact of IAM budgets, skills, priorities, architectural decisions, the vendor landscape, and deployment options.
Posted: 26 Jul 2018 | Published: 09 Jan 2018

OneLogin

Best Practices for Secure Authentication
sponsored by IBM
WHITE PAPER: Learn how your organization can establish a path to stronger authentication and choose an approach that balances both security and business needs.
Posted: 26 Jul 2018 | Published: 30 Jun 2017

IBM

Report – Market Guide for Privileged Access Security Management
sponsored by CA Technologies
ANALYST REPORT: In Gartner market guide for privileged access security management, learn about 24 vendors in this competitive and rapidly maturing market.
Posted: 26 Jul 2018 | Published: 22 Aug 2017

CA Technologies

GDPR is Here: Are You Ready?
sponsored by Oracle Cloud
VIDEO: In this webcast, hear from Allesandro Vallega, Security & GDPR business development director at Oracle EMEA about survey results, maturity categories across industries, and cloud services that can help achieve GDPR compliance.
Posted: 26 Jul 2018 | Premiered: 24 Jul 2018

Oracle Cloud

Buyer's Guide: Access and Authentication
sponsored by IBM
ESSENTIAL GUIDE: Transform and accelerate secure access to your organization's applications today. Read on to find out how your enterprise can benefit from a strong, secure access management program in this quick and informative buyer's guide.
Posted: 26 Jul 2018 | Published: 30 Apr 2017

IBM

Insider Threat: 2018 Report
sponsored by CA Technologies
RESEARCH CONTENT: Learn how you can help protect your organization's most vulnerable data against inside cyberattacks – today's most damaging security threats.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

CA Technologies

How to Counter Insider Threats Inside your Organization
sponsored by CA Technologies
EBRIEF: Learn how your organization can gain a comprehensive strategy against ever-evolving threats, regardless of whether they are internal or external.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

CA Technologies
1 - 25 of 555 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement