IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 475 Matches Previous Page  |  Next Page
Okta VIDEO 2
sponsored by Okta
WEBCAST: In this episode of Okta’s Digital Identity Webcast Series, unlock exclusive insight into building digital trust and enabling better user experiences by embracing customer identity and access management (CIAM). Watch now to get started.
Posted: 02 Aug 2021 | Premiered: Aug 2, 2021

Okta

Okta VIDEO 3
sponsored by Okta
WEBCAST: As more and more organizations embrace the benefits of cloud capabilities, digital work environments become more complex. Watch this webinar to learn more about the evolving challenges and requirements of identity and access management (IAM) in the era of hybrid IT
Posted: 02 Aug 2021 | Premiered: Aug 2, 2021

Okta

Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment
sponsored by WatchGuard Technologies, Inc.
EBOOK: MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.
Posted: 15 Jul 2021 | Published: 15 Jul 2021

WatchGuard Technologies, Inc.

A Computer Weekly e-Guide to IAM
sponsored by ComputerWeekly.com
EGUIDE: We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Executive Interview: Unleashing blockchain's potential
sponsored by ComputerWeekly.com
EGUIDE: Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021

ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

Meeting NIST Guidelines for Zero Trust Security
sponsored by Thales
EBOOK: The digital age has completely transformed how organizations protect their users and data – traditional perimeter security methods have been replaced by Zero Trust architectures. Take this brief survey to access this white paper and learn about facilitating effective Zero Trust implementation through NIST guidelines.
Posted: 04 May 2021 | Published: 31 Oct 2020

Thales

Manage Authentication Deployments Faster and More Effectively
sponsored by Thales
EBOOK: Cloud-based authentication services, especially when part of a broader access management service, can help organizations achieve significant savings through automation. To learn about the SafeNet Trusted Access solution from Thales, take a brief survey so you can gain access to an outline of its key benefits and features.
Posted: 04 May 2021 | Published: 04 May 2021

Thales

Colt Telecommunications Case Study
sponsored by Hitachi ID
CASE STUDY: Colt Telecommunications needed an integrated, efficient and easy to use solution to address its identity and privileged access requirements. Download this case study to learn how Hitachi ID was able to help with their Bravura Identity, Privilege and Pass – providing one integrated suite and set of connectors.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

Hitachi ID

6 Key Identity and Access Management Benefits
sponsored by Beta Systems
EGUIDE: Identity and access management (IAM) gives organizations an enhanced ability to oversee their digital identities. In a remote and hybrid world, the benefits of IAM are more pronounced than ever. Read this guide to take in 6 of these key benefits, and learn why adopting IAM practices gives you a competitive advantage.
Posted: 14 Apr 2021 | Published: 06 Apr 2021

Beta Systems

Grow Your BusinessWith the Power of GlobalSign
sponsored by GlobalSign
EBOOK: One of the challenges faced by digital organizations today is managing digital identities – eSignature compliance, email security and mobile device management all can be made simpler with a cohesive digital identity management platform. View this e-book to see how GlobalSign’s public key infrastructure (PKI) may be able to help.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

GlobalSign

Protecting On-Premises Microsoft Exchange Servers
sponsored by TransientX, Inc
WHITE PAPER: On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


Why IAM policies are crucial post pandemic
sponsored by Beta Systems
EGUIDE: Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management (IAM). Find out why IAM policies are crucial in the new normal.
Posted: 02 Apr 2021 | Published: 01 Apr 2021

Beta Systems

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Increase In Number Of Users Verified And Onboarded
sponsored by Onfido
CASE STUDY: Download this case study to uncover how Drivy was able to increase the number of users verified and onboarded with Onfido.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

Onfido

Gartner Market Guide to Zero Trust Network Access
sponsored by Axis Security
RESOURCE: If your organization is looking into zero trust network access (ZTNA), download this Gartner ZTNA Market Guide outlining key findings, recommendations, market direction and various ZTNA models and vendors.
Posted: 31 Mar 2021 | Published: 08 Jun 2020

Axis Security

Of Case Approvals Are Automated End-To-End
sponsored by Onfido
CASE STUDY: Finiata eliminate cashflow problems for small businesses in Europe by providing access to liquidity and insights into cashflow. They’d faced two challenges – managing risk and making it easier to verify business customers. But manual processes were getting in the way. Access this case study to see how Finiata now verify at scale.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Reduction In Time To Onboard Customers
sponsored by Onfido
CASE STUDY: Grover is a German lending & eCommerce (or “Rent Tech”) company. To reduce risk, Grover perform a detailed review on each business customer signing up to their system to verify their identity – but it was an expensive, manual process. View this case study to learn how Onfido helped them to verify customers at scale with low risk.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Of Global Identity Checks Verified In A Day
sponsored by Onfido
CASE STUDY: Neeyamo is a platform-based HR solutions provider, offering their customers an ‘Identity Check’ service for potential candidates. As they expanded, they had to continually adhere to native screening compliances for country-specific regulations. This case study outlines how AI-driven identity verification made compliance easy for Neeyamo.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

To Approve A Customer For Localbitcoins
sponsored by Onfido
CASE STUDY: LocalBitcoins is on a mission to promote financial inclusion, connecting everybody to the internet economy through Bitcoin. Positioned as the most secure and user-centric cryptocurrency platform on the market, they needed a strong identity partner for fraud protection and seamless sign-up. View this case study to learn how Onfido helped.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Leading Innovation In Banking By Securing Users & Files
sponsored by SailPoint Technologies
CASE STUDY: For Nedbank, one of the four largest banking groups in South Africa, security was becoming a burden. Layering legacy and mainframe solutions over recent digital technology was becoming laborious, and providing access to users was complex and too demanding on IT. See this case study to learn how modern identity governance saved the day.
Posted: 29 Mar 2021 | Published: 29 Mar 2021

SailPoint Technologies

Be Secure. Be Compliant. Why Access Management Alone Is Not Enough
sponsored by SailPoint Technologies
EBOOK: Quick authentication places organizations at risk – risk that can only be addressed by identity security that puts proper controls in place and continuously monitors for ‘red flags’ when authenticating. View this e-book to learn how identity security reduces risk by eliminating access management blind spots and maintaining compliance.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

SailPoint Technologies

Increase Productivity And Security With Sailpoint For Microsoft Teams
sponsored by SailPoint Technologies
DATA SHEET: Secure collaboration is top of mind for organizations that have adopted or plan to adopt Microsoft Teams. To enhance identity security within Teams, SailPoint has created a Teams integration that allows employees to access corporate resources from directly within the app. View this data sheet to get a closer look.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

SailPoint Technologies

Increase In Number Of Customer Conversions
sponsored by Onfido
CASE STUDY: Pockit is an online bank with over 400k customers. They were challenged with onboarding customers and verifying their identity, processes necessary both to grow their business and stay compliant, as a lengthy onboard meant for more drop-offs. Download this case study to learn how Pockit increased their conversion rate by 15%.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Onfido
1 - 25 of 475 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences