IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 527 Matches Previous Page  |  Next Page
6 Key Identity and Access Management Benefits
sponsored by Beta Systems
EGUIDE: Identity and access management (IAM) gives organizations an enhanced ability to oversee their digital identities. In a remote and hybrid world, the benefits of IAM are more pronounced than ever. Read this guide to take in 6 of these key benefits, and learn why adopting IAM practices gives you a competitive advantage.
Posted: 14 Apr 2021 | Published: 06 Apr 2021

Beta Systems

Grow Your BusinessWith the Power of GlobalSign
sponsored by GlobalSign
EBOOK: One of the challenges faced by digital organizations today is managing digital identities – eSignature compliance, email security and mobile device management all can be made simpler with a cohesive digital identity management platform. View this e-book to see how GlobalSign’s public key infrastructure (PKI) may be able to help.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

GlobalSign

Protecting On-Premises Microsoft Exchange Servers
sponsored by TransientX, Inc
WHITE PAPER: On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


Why IAM policies are crucial post pandemic
sponsored by Beta Systems
EGUIDE: Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management (IAM). Find out why IAM policies are crucial in the new normal.
Posted: 02 Apr 2021 | Published: 01 Apr 2021

Beta Systems

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Increase In Number Of Users Verified And Onboarded
sponsored by Onfido
CASE STUDY: Download this case study to uncover how Drivy was able to increase the number of users verified and onboarded with Onfido.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

Onfido

Gartner Market Guide to Zero Trust Network Access
sponsored by Axis Security
RESOURCE: If your organization is looking into zero trust network access (ZTNA), download this Gartner ZTNA Market Guide outlining key findings, recommendations, market direction and various ZTNA models and vendors.
Posted: 31 Mar 2021 | Published: 08 Jun 2020

Axis Security

Of Case Approvals Are Automated End-To-End
sponsored by Onfido
CASE STUDY: Finiata eliminate cashflow problems for small businesses in Europe by providing access to liquidity and insights into cashflow. They’d faced two challenges – managing risk and making it easier to verify business customers. But manual processes were getting in the way. Access this case study to see how Finiata now verify at scale.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Reduction In Time To Onboard Customers
sponsored by Onfido
CASE STUDY: Grover is a German lending & eCommerce (or “Rent Tech”) company. To reduce risk, Grover perform a detailed review on each business customer signing up to their system to verify their identity – but it was an expensive, manual process. View this case study to learn how Onfido helped them to verify customers at scale with low risk.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Of Global Identity Checks Verified In A Day
sponsored by Onfido
CASE STUDY: Neeyamo is a platform-based HR solutions provider, offering their customers an ‘Identity Check’ service for potential candidates. As they expanded, they had to continually adhere to native screening compliances for country-specific regulations. This case study outlines how AI-driven identity verification made compliance easy for Neeyamo.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

To Approve A Customer For Localbitcoins
sponsored by Onfido
CASE STUDY: LocalBitcoins is on a mission to promote financial inclusion, connecting everybody to the internet economy through Bitcoin. Positioned as the most secure and user-centric cryptocurrency platform on the market, they needed a strong identity partner for fraud protection and seamless sign-up. View this case study to learn how Onfido helped.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Leading Innovation In Banking By Securing Users & Files
sponsored by SailPoint Technologies
CASE STUDY: For Nedbank, one of the four largest banking groups in South Africa, security was becoming a burden. Layering legacy and mainframe solutions over recent digital technology was becoming laborious, and providing access to users was complex and too demanding on IT. See this case study to learn how modern identity governance saved the day.
Posted: 29 Mar 2021 | Published: 29 Mar 2021

SailPoint Technologies

Be Secure. Be Compliant. Why Access Management Alone Is Not Enough
sponsored by SailPoint Technologies
EBOOK: Quick authentication places organizations at risk – risk that can only be addressed by identity security that puts proper controls in place and continuously monitors for ‘red flags’ when authenticating. View this e-book to learn how identity security reduces risk by eliminating access management blind spots and maintaining compliance.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

SailPoint Technologies

Increase Productivity And Security With Sailpoint For Microsoft Teams
sponsored by SailPoint Technologies
DATA SHEET: Secure collaboration is top of mind for organizations that have adopted or plan to adopt Microsoft Teams. To enhance identity security within Teams, SailPoint has created a Teams integration that allows employees to access corporate resources from directly within the app. View this data sheet to get a closer look.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

SailPoint Technologies

Increase In Number Of Customer Conversions
sponsored by Onfido
CASE STUDY: Pockit is an online bank with over 400k customers. They were challenged with onboarding customers and verifying their identity, processes necessary both to grow their business and stay compliant, as a lengthy onboard meant for more drop-offs. Download this case study to learn how Pockit increased their conversion rate by 15%.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Onfido

To Register And Verify A Customer’S Identity
sponsored by Onfido
CASE STUDY: Sidehide is a service offering users a seamless hotel booking and check-in experience; “one-click hotels”, as they call it. They’d faced an issue: Manually verifying the identity of the person checking in took a lot of time, but it had to be done for compliance. View this case study to learn how Sidehide shortened the process to just one minute.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Onfido

Provide Secure Remote Access And Gain Peace Of Mind With Palo Alto Networks Prisma Access
sponsored by Palo Alto Networks
ANALYST REPORT: As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Palo Alto Networks

Guide To The Identity Landscape
sponsored by Onfido
RESOURCE: Business is going digital, and risk must be reduced to stay secure and compliant. In a remote world, identity serves as the front line of your security, and not only that – today’s customers expect more services to be available remotely, with less friction. Download this guide to take an in-depth look at the identity landscape.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Onfido

To Verify New Customer Identities
sponsored by Onfido
CASE STUDY: Aion Bank is a subscription-only digital bank. Currently, digital makes fulfilling regulatory requirements such as ‘Know Your Customer’ (KYC) a challenge, meaning this Bank needed strong confidence in their customers’ identities in a remote setting. Download this case study to learn how Aion Bank made customer onboarding as seamless as possible.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Onfido

Increase In Customer Conversion
sponsored by Onfido
CASE STUDY: MACH is a digital-first bank allowing customers to bank from their smartphone. With the goal of increasing customers, this bank has to onboard at a rapid pace while still preventing fraud and without compromising on compliance. Examine this case study to learn how Onfido’s platform helps MACH to securely onboard at scale.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Onfido

A Guide To Digital Identity Verification: The Technology And Trends
sponsored by Onfido
WHITE PAPER: Both traditional and all-digital businesses need to onboard new users to their services remotely – but they also need to monitor the risks to their platform as their user base increases. Download this white paper to explore how you can use machine learning (ML) to securely onboard anyone, anywhere with an internet connection.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Onfido

Full Mainframe Protection For The Entire Security Lifecycle
sponsored by BROADCOM, Inc
EBOOK: The more rules there are, the easier it is to fall foul of them, even if you don’t mean to. And as your business grows, there are always going to be new risks to think about. Identify, manage and minimize your exposure to risk. Watch this 8-minute video to discover Deloitte’s Integrated Risk Management, powered by ServiceNow.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

BROADCOM, Inc

Faster To Onboard And Verify New Customers
sponsored by Onfido
CASE STUDY: TBI Bank had a goal of increasing customer sign ups. To prevent fraud, TBI reviewed each new customer with live video calls where an agent would extract document information and assess it. But this took too long (6 mins. per customer) and had a poor UX. View this case study to learn how Onfido helped TBI securely onboard customers at scale.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

Onfido

Verify User Identity With Cisco Secure Remote Worker
sponsored by Silver Peak and Red Swan
RESOURCE: Many software firms have put together identity and threat detection platforms in recent times – but what you need is a platform built to perform these functions with WFH at the heart of its design. Download this resource to view different scenarios in which Cisco Secure Remote Worker can enable secure access and detect threats.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Silver Peak and Red Swan
1 - 25 of 527 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences