IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
1 - 25 of 415 Matches Previous Page  |  Next Page
Ultimate Guide to IT Monitoring Management and Modernization
sponsored by Venafi
EBOOK: PH
Posted: 08 Oct 2021 | Published: 08 Oct 2021

Venafi

A Look at Data Science in 2021
sponsored by Venafi
EBOOK: PH
Posted: 08 Oct 2021 | Published: 08 Oct 2021

Venafi

The Reality of IAM and Blockchain
sponsored by Okta
EBOOK: PH
Posted: 05 Oct 2021 | Published: 05 Oct 2021

Okta

Companies Cautiously Optimistic About CyberSecurity
sponsored by Okta
EBOOK: PH
Posted: 05 Oct 2021 | Published: 05 Oct 2021

Okta

The Rise of Credential Stuffing Attacks
sponsored by Okta
EBOOK: PH
Posted: 05 Oct 2021 | Published: 05 Oct 2021

Okta

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019

TechTarget

SailPoint - Identity and Access Management for Healthcare
sponsored by KPMG LLP SailPoint
LANDING PAGE: As healthcare organizations and their patients continue to rely more and more on medical devices to access data, securing each data access point becomes critical. Check out this landing page to learn how KPMG, a SailPoint deployment partner, is enhancing identity and access management (IAM) for healthcare.
Posted: 19 Aug 2021 | Published: 19 Aug 2021

KPMG LLP SailPoint

Moving towards compliance with identity governance for files
sponsored by KPMG LLP SailPoint
WHITE PAPER: Protecting an organization’s most sensitive information – intellectual property, financial documents, personal info on employees and customers, etc. – is a critical responsibility for IT and security teams, especially as data privacy laws grow more stringent. Read this white paper to learn more about achieving identity governance and compliance.
Posted: 12 Aug 2021 | Published: 12 Aug 2021

KPMG LLP SailPoint

Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment
sponsored by WatchGuard Technologies, Inc.
EBOOK: MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.
Posted: 15 Jul 2021 | Published: 15 Jul 2021

WatchGuard Technologies, Inc.

A Computer Weekly e-Guide to IAM
sponsored by ComputerWeekly.com
EGUIDE: We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Executive Interview: Unleashing blockchain's potential
sponsored by ComputerWeekly.com
EGUIDE: Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021

ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

6 Key Identity and Access Management Benefits
sponsored by Beta Systems
EGUIDE: Identity and access management (IAM) gives organizations an enhanced ability to oversee their digital identities. In a remote and hybrid world, the benefits of IAM are more pronounced than ever. Read this guide to take in 6 of these key benefits, and learn why adopting IAM practices gives you a competitive advantage.
Posted: 14 Apr 2021 | Published: 06 Apr 2021

Beta Systems

Grow Your BusinessWith the Power of GlobalSign
sponsored by GlobalSign
EBOOK: One of the challenges faced by digital organizations today is managing digital identities – eSignature compliance, email security and mobile device management all can be made simpler with a cohesive digital identity management platform. View this e-book to see how GlobalSign’s public key infrastructure (PKI) may be able to help.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

GlobalSign

Protecting On-Premises Microsoft Exchange Servers
sponsored by TransientX, Inc
WHITE PAPER: On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


Why IAM policies are crucial post pandemic
sponsored by Beta Systems
EGUIDE: Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management (IAM). Find out why IAM policies are crucial in the new normal.
Posted: 02 Apr 2021 | Published: 01 Apr 2021

Beta Systems

The Rise of Credential Stuffing Attacks
sponsored by TechTarget
RESOURCE: According to Verizon's 2021 DBIR, today's cybercriminals want credentials. In fact, compromised credentials are cited as the top cause across most data breaches. Access our expert e-guide, The Rise of Credential Stuffing Attacks, to unlock exclusive insight on cybercriminal behavior and best practices for keeping your employee accounts safe.
Posted: 02 Apr 2021 | Published: 03 Oct 2021

TechTarget

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Increase In Number Of Users Verified And Onboarded
sponsored by Onfido
CASE STUDY: Download this case study to uncover how Drivy was able to increase the number of users verified and onboarded with Onfido.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

Onfido

Gartner Market Guide to Zero Trust Network Access
sponsored by Axis Security
RESOURCE: If your organization is looking into zero trust network access (ZTNA), download this Gartner ZTNA Market Guide outlining key findings, recommendations, market direction and various ZTNA models and vendors.
Posted: 31 Mar 2021 | Published: 08 Jun 2020

Axis Security

Of Case Approvals Are Automated End-To-End
sponsored by Onfido
CASE STUDY: Finiata eliminate cashflow problems for small businesses in Europe by providing access to liquidity and insights into cashflow. They’d faced two challenges – managing risk and making it easier to verify business customers. But manual processes were getting in the way. Access this case study to see how Finiata now verify at scale.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Reduction In Time To Onboard Customers
sponsored by Onfido
CASE STUDY: Grover is a German lending & eCommerce (or “Rent Tech”) company. To reduce risk, Grover perform a detailed review on each business customer signing up to their system to verify their identity – but it was an expensive, manual process. View this case study to learn how Onfido helped them to verify customers at scale with low risk.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Of Global Identity Checks Verified In A Day
sponsored by Onfido
CASE STUDY: Neeyamo is a platform-based HR solutions provider, offering their customers an ‘Identity Check’ service for potential candidates. As they expanded, they had to continually adhere to native screening compliances for country-specific regulations. This case study outlines how AI-driven identity verification made compliance easy for Neeyamo.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

To Approve A Customer For Localbitcoins
sponsored by Onfido
CASE STUDY: LocalBitcoins is on a mission to promote financial inclusion, connecting everybody to the internet economy through Bitcoin. Positioned as the most secure and user-centric cryptocurrency platform on the market, they needed a strong identity partner for fraud protection and seamless sign-up. View this case study to learn how Onfido helped.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

Onfido

Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.
Posted: 17 Oct 2021 | Published: 19 Oct 2021

ComputerWeekly.com
1 - 25 of 415 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences