IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
51 - 75 of 500 Matches Previous Page  |  Next Page
Dispelling the Myths of Single Sign-On Portals vs. Full-Featured IAM Systems
sponsored by Identity Automation
EBOOK: The average enterprise now relies on 935 different cloud applications, according to Netskope's Cloud Report. Utilize this resource to decide whether or not your enterprise needs an IAM approach that goes beyond single sign-on to effectively secure your cloud applications.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Enabling Healthcare with Trusted Access
sponsored by Duo Security
WEBCAST: Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.
Posted: 18 Jan 2018 | Premiered: Jan 18, 2018

Duo Security

Market Guide for Endpoint Detection and Response Solutions
sponsored by enSilo
RESOURCE: The endpoint detection and response (EDR) market is rapidly growing as security and risk management leaders seek adaptive security architecture. Take a look at this Gartner Market Guide to uncover various endpoint detection and response strategies.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Overcome the Top 5 Cloud Migration Obstacles with IAM
sponsored by Identity Automation
EBOOK: According to an IDG survey, 45% of organizations have already moved their applications and computing infrastructure to the cloud. Explore this resource to gain insight into why IAM should be the focal point of your cloud migration strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
EBOOK: This e-book details a comprehensive set of criteria to customize your evaluation to your organization's security needs and how to determine your ROI when deploying your two-factor authentication tools.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Duo Security

4 Reasons Why IAM Should Be the Core of Your Security Program
sponsored by Identity Automation
EBOOK: As businesses embrace BYOD policies and more employees work remotely, companies need to change the way they view the threat landscape. Explore this e-book to uncover how to increase security in a perimeter-less global business environment by advancing IAM.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

5 Signs You Need to Upgrade Your Legacy IA M System
sponsored by Identity Automation
WHITE PAPER: While 49% of business applications are now stored in the cloud, less than half of them are known or approved by the IT department, according to Ponemon Institute. This white paper reveals 5 signs you need to update your legacy identity and access management system.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

3 Types of Rogue Employees and How to Stop Them
sponsored by Identity Automation
WHITE PAPER: Employees pose the greatest threat to any organization and have the capability to cause egregious harm and costs through data breaches, insecure transactions, and cyber theft. This e-book reveals 3 types of employees who pose security risks and offers strategic approaches utilizing IAM for mitigating these risks and improving your security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

Securing the Modern Enterprise
sponsored by Duo Security
WHITE PAPER: The most difficult aspect of an enterprise to control is the human element. This white paper provides enterprises with strategic approaches for securing the enterprise and protecting against its weakest vulnerabilities.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

IAM as a Foundation for Your AWS Migration Strategy
sponsored by Identity Automation
WHITE PAPER: Using IAM as the foundation of your AWS migration can reduce complexity, smooth out the overall process, and help ensure a successful transition to the cloud. This white paper offers strategies for enhancing your AWS deployment with an IAM approach.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

Definitive Guide to Account Username Conventions
sponsored by Identity Automation
WHITE PAPER: One of the most important and the most challenging IAM configuration options is defining the company's username convention. This 23-page guide details how to significantly reduce the time required defining and standardizing the username convention method.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Identity Automation

Trusted Access For Painless Security
sponsored by Duo Security
RESOURCE: Learn how to help reduce risk of a data breach caused by compromised credentials, known vulnerabilities, or exploits and how to verify your users' identity up front through authentication.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Duo Security

Closing the Cloud Security Gap
sponsored by West UC
WHITE PAPER: According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

West UC

Omnichannel for Retail
sponsored by iovation, Inc.
WHITE PAPER: This resource explores the benefits of adopting multi-factor authentication strategies for mobile devices to improve security and enhance the user experience.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

iovation, Inc.

Why Device Risk is an Essential Element for Your MFA Strategy
sponsored by iovation, Inc.
WEBCAST: Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.
Posted: 13 Dec 2017 | Premiered: Oct 31, 2017

iovation, Inc.

Omnichannel Authentication
sponsored by iovation, Inc.
RESOURCE: While the current banking experience is a multichannel approach, which provides fast access, it does not provide a secure, effortless user experience. This resource provides insight into omnichannel authentication within mobile banking to help provide customers a seamless, effortless, high-quality experience, while maintaining security.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

iovation, Inc.

CW Europe – December 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 07 Dec 2017 | Published: 14 Dec 2017

ComputerWeekly.com

Fighting Against Authorized Push Payment (APP) Scams
sponsored by HID Global
WHITE PAPER: This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.
Posted: 30 Nov 2017 | Published: 21 Nov 2017

HID Global

Understanding the Role of Stolen Credentials in Data Breaches
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn the 2 steps of a successful credential theft, then learn about a service that fights back against both of these attack paths.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Palo Alto Networks

Cybersecurity for Dummies
sponsored by Thycotic
WHITE PAPER: People are the number one target and cause of cybersecurity failures. Explore this 29-page For Dummies e-book to learn about cybersecurity, how to recognize and respond to threats, and how to protect your company.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Thycotic

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows
51 - 75 of 500 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement