IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 552 Matches Previous Page  |  Next Page
Securing your Enterprise Credentials
sponsored by Ping Identity Corporation
WHITE PAPER: Stealing credentials is the primary motive for those that intend on attacking your enterprise. And relying on usernames and passwords can make it easier for them. In this white paper, learn how to implement an MFA solution to strengthen your security, so you can confidently manage digital transformation across your enterprise.
Posted: 18 Dec 2018 | Published: 30 Jun 2017

Ping Identity Corporation

You Can't Spell Enterprise Security without MFA
sponsored by Ping Identity Corporation
WEBCAST: Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and controls with multi-factor authentication, allowing them to move away from a high-risk, password based security approach. Listen as Paul Madsen from the CTO office of Ping Identity explains the benefits of MFA.
Posted: 18 Dec 2018 | Premieres: Dec 31, 2018

Ping Identity Corporation

The Security Leader's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 10 Dec 2018 | Published: 31 May 2017

Ping Identity Corporation

Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

Modern Two-Factor Authentication: Easy. Affordable. Secure
sponsored by Duo Security
WHITE PAPER: The ease of stealing IDs and passwords has led to criminals targeting organizations of all sizes. However, two-factor authentication stops easy access to stolen credentials by requiring a second level of authentication. Find out why deploying two-factor authentications may be a better choice for your company.
Posted: 07 Dec 2018 | Published: 31 Dec 2013

Duo Security

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit Manchester to examine the city's growing digital and e-commerce industry and find out why the former home of the UK rag trade has been so successful. We look at the challenges of IT security in the quantum computing age. And we talk to Bloomberg's CTO about tech innovation. Read the issue now.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

ComputerWeekly.com

Social Media Account Takeovers
sponsored by Proofpoint, Inc.
WHITE PAPER: Most organizations lack the protective countermeasure or the expertise to mitigate risk and response to social media account takeovers. In this white paper, learn about how takeovers are possible, the complexity of social media accounts and how to prevent an attack from happening.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Proofpoint, Inc.

Are Your Network Users Over-Privileged?
sponsored by Cyxtera
RESOURCE: Find out how to improve privileged access management with tips on how to enforce a zero-trust model that's purpose-built for the software-defined network perimeter.
Posted: 04 Dec 2018 | Published: 17 Sep 2018

Cyxtera

Leading the Way with Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: According to the 2018 Verizon Data Breach Report, the hospitality industry is one of the top five industries subjected to network breaches every year. Learn how OpenKey, a company leading the way with secure mobile keyless hotel access, was able to securely host their customer data with a private cloud provider.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Armor

Unlocking B2B SaaS Growth with Identity Management
sponsored by Auth0
WHITE PAPER: Explore the role of identity management as well as, 3 ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Build vs. Buy - Guide to Identity Management
sponsored by Auth0
WHITE PAPER: Learn how you can reap the benefits of an identity management platform, today.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

The Cost of Credential Stuffing: A Poneman Institute Research Report
sponsored by Akamai Technologies
RESEARCH CONTENT: Uncover the survey results from this Ponemon Institute survey regarding, the costs of credential stuffing, volume of user attacks, the top 5 consequences of credential stuffing, and more.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

Akamai Technologies

Identity Proofing and GDPR: What Businesses Need to Know
sponsored by Evident
WHITE PAPER: The GDPR has catalyzed immense change and it is poised to cause even more disruption in the years to come. Inside, explore 8 central data subject rights established by GDPR, and uncover the user verification problems associated with the rights.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

What Hackers Know That You Don't
sponsored by Evident
WHITE PAPER: Companies such as LinkedIn, Uber and Equifax have all been victims of significant data hacks. In this white paper, uncover some basics of how breaches happen and where data travels when they do, as well as how you can strengthen security protocols to prevent breaches in the future.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

Büroalltag im Wandel: das Leben am digitalen Arbeitsplatz
sponsored by Citrix
WHITE PAPER: Hier erfahren Sie, wie ein sicherer, integrierter digitaler Arbeitsplatz Ihnen dabei hilft, einen besseren Kundendienst bereitzustellen, Leiharbeiter und mobile Mitarbeiter sicher einzugliedern und den Wettbewerbsvorteil auszubauen.
Posted: 22 Oct 2018 | Published: 09 Nov 2018

Citrix

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

ComputerWeekly.com

Top 5 Least Privilege Reports CISOs Live For Implement Least Privilege for a Measurable Security Plan
sponsored by Thycotic
RESOURCE: Among all security strategies CISOs employ, the principle of least privilege is one that can draw a direct line from implementation to value. Download this resource to learn what it takes to implement least privilege in your organization, today.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Thycotic

Is Your Software Simple? Assess How Well the PAM Software You Choose Supports Your Goals
sponsored by Thycotic
RESOURCE: Is the Privileged Access Management (PAM) software you chose right for your business? Take this simple test to find out.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Thycotic

The Total Economic Impact™ of the Auth0 Identity Platform
sponsored by Auth0
ANALYST REPORT: Download this Forrester TEI report to better understand the benefits, costs, and risks associated with the AuthO identity platform.
Posted: 05 Oct 2018 | Published: 31 Oct 2017

Auth0

The Journey to IAM Success
sponsored by One Identity
EBOOK: Read this insightful overview of IAM-project strategy from organizations that have made the journey to IAM success. Discover their recommendations for planning and executing your IAM project.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

One Identity

Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
RESOURCE: Discover the importance of identity governance and how you can effectively manage it while taking account of complexity, compliance and limited IT resources.
Posted: 01 Oct 2018 | Published: 31 Dec 2017

One Identity

Secure Software Development in the Financial Services Industry
sponsored by GitHub
RESOURCE: Find out how financial service institutions (FSIs) can meet strict security regulations and create a culture of truly secure software development to deliver the best possible products while safeguarding customer data.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

GitHub
1 - 25 of 552 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement