IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 552 Matches Previous Page  |  Next Page
Manage Secrets throughout DevSecOps with Red Hat and CyberArk
sponsored by Red Hat
VIDEO: Emphasizing security throughout DevOps, also known as DevSecOps, has become a common practice across organizations. This webinar highlights how identity and access management (IAM) can fit into the software development lifecycle – watch this webinar to explore the role of IAM in DevSecOps.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

Secure Remote Access solutions: A Buyer’s Guide
sponsored by Redcentric Solutions Ltd
EBOOK: Businesses are on a limb when it comes to risk management. Getting employees online in a safe manner is a frequent conversation piece, and security professionals hear about it every day. It’s time to give your employees the best secure remote experience possible. Leverage this white paper to learn how to remove risk from remote access.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Redcentric Solutions Ltd

Using Online Identities in Professional Investigations
sponsored by Pipl
WHITE PAPER: As interactions have become more and more digital, online identities have emerged to replace the traditional notion of a user identity. Read this white paper to learn more about the changing nature of identity and how Pipl leverages online identity data to enhance investigations into today’s cyberthreats.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

Pipl Search For Identity Verification - The Power Of Over 3 Billion Online Identities!
sponsored by Pipl
VIDEO: In this short video, learn about Pipl SEARCH, which helps e-commerce professionals reduce customer friction, case resolution times, false positives, and the risks associated with fraud.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Pipl

OAuth and OpenID Connect - What's Next?
sponsored by Curity AB
WEBCAST: The OAuth 2.0 framework has provided identity professionals open standards for authenticating users, but the world is now mobile, and the way apps are being built is changing. OpenID Connect by Curity is an identity layer on top of the current OAuth protocol that is API-ready for a remote workforce. Watch this webcast to see why this matters now.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

Curity AB

Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

Helping Educators Defend their Web Applications with Amazon & Fortinet
sponsored by Fortinet, Inc.
VIDEO: Today’s distributed organizations operate outside what would be traditionally considered a perimeter. As a result, web application and API security are increasingly becoming the first line of defense for critical business asset. Watch this webinar to unlock exclusive insight regarding web app and API security from leaders at AWS and Fortinet.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Introducing NetMotion SDP
sponsored by NetMotion
RESOURCE: Security teams need uncompromised visibility across all devices, no matter where they are or what network they’re on. In this vein, they also need to prevent unwanted lateral movement across networks by granting access only to necessary applications. Engage this interactive product page where you can absorb the ins and outs of NetMotion SDP.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

NetMotion

Virtualization-Based Security - External Key Management
sponsored by Thales
WHITE PAPER: Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Their mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field. Scan this white paper to get a closer look at TCT and their enterprise cryptographic key manager.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Thales

Evaluating Privilege Escalation Risk in AWS
sponsored by Sonrai security
EBOOK: In this eguie, read on about Evalutating Privelege Escalation Risks in Amazon Web Services, the process behind this evaluation, some key patterns and data breaches, and how Sonrai Security can help you improve identity and access governance accross the public cloud.
Posted: 15 Jan 2021 | Published: 15 Jan 2021


Okta + Netskope + CrowdStrike + Proofpoint: Securely Enable Remote Work at Scale
sponsored by Okta
DATA SHEET: Security and access challenges have been magnified by the massive global shift towards remote work. Read this data sheet to see how Okta, Netskope, Crowdstrike and Proofpoint (also known as the Spectra Alliance) combine their efforts to enable organizations to securely enable remote work at scale.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Cloud Guide to Achieving the Principle of Least Privilege
sponsored by Sonrai security
EBOOK: In this guide, read about Identity and Data Access management in the Public Cloud and what makes the management of priviledged identities so difficult.
Posted: 15 Jan 2021 | Published: 15 Jan 2021


The Future of CIAM: 4 Trends Shaping Identity and Access Management
sponsored by Okta
WHITE PAPER: As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 15 Jan 2021 | Published: 19 Jan 2021

ComputerWeekly.com

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl

The Neo-Security Architecture
sponsored by Curity AB
WHITE PAPER: The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Curity AB

Machine identities are the foundation of security
sponsored by Venafi
EBOOK: In this guide read more about how you can accelerate innovation.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Venafi

Machine Identity Protection for Dummies
sponsored by Venafi
EBOOK: After reading this book, you'll know why you should make protecting machine identities a priority in your organization.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Venafi

Tales of 3 Clouds: How Venafi Helps Organizations with Digital Transformation
sponsored by Venafi
EBOOK: How Do You Migrate Safely to the Cloud? Take this survey to download your free guide and learn more.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Venafi

Venafi Infographic Microsoft Teams Outage
sponsored by Venafi
EBOOK: Venafi Infographic Microsoft Teams Outage
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Venafi

The Machine Identity Crisis
sponsored by Venafi
EBOOK: In this guide read about how the explosion of machines is affecting the security ofmachine-to-machine communications.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Venafi

Adapt to Long-Term Remote Work with Adaptive Access Policies
sponsored by Okta
VIDEO: Last year, organizations scrambled to enable their employees to work remotely – but how are organizations preparing for reality of a decentralized workforce for the long term? Watch this webinar to learn more about sustainable best practices for securing and enabling a remote workforce.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Okta

Surviving Beyond the New Normal: It's More than Securing Your Remote Workers
sponsored by Okta
WEBCAST: In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.
Posted: 14 Jan 2021 | Premiered: Jan 14, 2021

Okta
1 - 25 of 552 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info