IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 435 Matches Previous Page  |  Next Page
Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Thales

Okta Inner Circle Conversations: How Selfies are Helping Secure the Insurance Sector
sponsored by Okta
WEBCAST: In this webinar, uncover how Okta partners with Jumio to use facial recognition selfie-based authentication to replace knowledge-based authentication.
Posted: 07 Jul 2020 | Premiered: Jul 7, 2020

Okta

The great IAM - time to modernise?
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 03 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

BlackBerry AI Powered Zero Trust
sponsored by BlackBerry
WEBCAST: Endpoint security affects all aspects of an organization, not least when workforces are remote.To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner?This webcast presents models that organizations can use.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

BlackBerry

Auth0’s Approach to Information Security Identity in the Real World
sponsored by Auth0
WHITE PAPER: Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Auth0

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

How to Implement Zero Trust Security in Europe
sponsored by Okta
WEBCAST: Zero Trust has come a long way since its inception in 2009, but many still have questions. What should Zero Trust look like? How does it affect workloads, networks, people and devices within an organization? How can I begin to implement my own Zero-Trust model? Watch this webcast for answers to these questions and more from Forrester & Okta.
Posted: 01 Jul 2020 | Premiered: Sep 26, 2019

Okta

Why AWS + Auth0
sponsored by Auth0
WHITE PAPER: Implementing the right IAM or customer IAM tool in your AWS ecosystem requires thoughtful planning. This 52-page white paper provides a comprehensive collection of expertise, best practices and project planning insights for using AWS & Auth0 to set up an API gateway and protect your critical applications.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

The State of Zero Trust Security in Global Organisations
sponsored by Okta
ANALYST REPORT: If your organisation is looking to implement a zero-trust security model to one or more parts of your network, then this Okta report is a must-read.Zero trust is beginning to take shape across the globe, and this report reveals details as to where it is being implemented, the industries that are implementing it, and how to build a zero-trust stack.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

Okta

5 Identity Attacks that Exploit Your Broken Authentication
sponsored by Okta
RESOURCE: Compromised credentials are the leading cause of data beaches. These credentials can be compromised through a number of attacks, including phishing, credential stuffing and password spraying. In this infographic, learn how your organization can defend against data breaches with strong authentication.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

Okta

The Maturity of Zero Trust in Europe
sponsored by Okta
RESOURCE: While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Businesses at Work (from Home) 2020 Edition
sponsored by Okta
ANALYST REPORT: Organization around the world have reacted to the pandemic quickly, rolling out remote communication apps, extending VPNs, and adding MFA to ensure the productivity, connectivity, and security of their (now) remote workforces. In this report, 2020 Business at Work (from Home), take a closer look at the fastest growing apps and tools.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Identity as a Service for Dummies
sponsored by Okta
EGUIDE: According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

5 Arguments to Justify Your Identity Spend
sponsored by Okta
WHITE PAPER: When it comes to identity spend, there’s often a communication gap between the value of security infrastructure and key business initiatives. Discover 5 key business drivers, and how identity feeds into them, to help you make a stronger case for increased identity spending organization-wide.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Okta

Forrester Report: A Practical Guide to a Zero-Trust Implementation
sponsored by Okta
ANALYST REPORT: Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don’t know how to implement it, or they feel daunted by the shifts in strategy and architecture that Zero Trust demands. Read this Forrester report to learn the building blocks of a successful Zero-Trust implementation roadmap.
Posted: 26 Jun 2020 | Published: 15 Jan 2020

Okta

5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi Vantara
WHITE PAPER: The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020

Hitachi Vantara

Conquering the Authentication Challenge of Zero Trust
sponsored by Micro Focus
VIDEO: According to Forrester, passwords, along with similar traditional authentication methods, will soon be a thing of the past to be succeeded by biometrics in the zero-trust authentication architecture. Watch this video to go in-depth into advanced authentication methods, best practices and potential architectural blueprints.
Posted: 22 Jun 2020 | Premiered: 22 Jun 2020

Micro Focus

Demystifying Zero Trust
sponsored by Sophos
WHITE PAPER: Dive inside this paper to explore the concept and origins of zero-trust security, the benefits of implementing a zero-trust model, and the necessary first steps on how to transition your organization towards its own zero-trust initiative.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

Sophos

Customer Identity and Access Management - Deciding Between Build vs Buy
sponsored by Akamai Technologies
WEBCAST: This webinar explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations.
Posted: 22 Jun 2020 | Premiered: Jun 22, 2020

Akamai Technologies

Service Account Security for Dummies
sponsored by Thycotic
EBOOK: Nearly every organization faces significant security threats due to unmanaged, uncontrolled privileged service accounts, which hackers are happy to exploit. Download your copy of Service Account Security for Dummies to better understand and manage their service accounts and reduce the risk of accounts being compromised and abused.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

Thycotic

Why it's Critical to Improve your Password Policies in the age of GDPR
sponsored by TechTarget
RESOURCE: Now that we are living in the era of GDPR, it's critical more than ever to have a strong password policy in place to minimize the chances of a data breach announcement. In our expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in
Posted: 19 Jun 2020 | Published: 19 Jun 2020

TechTarget

Aruba ESP With Zero Trust Security: Security for the Edge
sponsored by Aruba Networks
DATA SHEET: In this brief, learn how Aruba ESP with Zero Trust Security can help improve an organization’s overall network security posture by applying a more rigorous set of security best practices and controls to previously trusted network resources.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Aruba Networks

Using Zero Trust to Enable Secure Remote Access
sponsored by BlackBerry
WHITE PAPER: As organizations continue to implement zero trust technologies, it’s critical to keep in mind that achieving an effective zero trust access control posture requires careful coordination and organization-wide buy-in. This SANS white paper offers additional expertise, including common challenges and key elements to consider.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

BlackBerry

Five Pillars of an actionable Cloud Security Framework in Azure
sponsored by Barracuda
WHITE PAPER: In order to ensure a responsible cloud migration, organizations need to ensure that they secure the network, applications and data that will reside in their cloud environment. This white paper takes the widely used NIST Cybersecurity Framework and turns it into 5 actionable pillars. Read on to get started.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Barracuda
1 - 25 of 435 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info