IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management

RSS Feed   
ALSO CALLED: Identity Management (Security), Identity Management and Access Control, IM (Identity Management), Identity Management Security, Management of Identity, User ID Management, Identity and Access Management, ID Management, IAM
DEFINITION: Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by  … 

Identity Management definition sponsored by SearchUnifiedCommunications.com, powered by WhatIs.com an online computer dictionary
Identity Management Reports
76 - 100 of 521 Matches Previous Page  |  Next Page
How IT Services are Implementing Fastpass Security Tools
sponsored by Fast Pass Corp
CASE STUDY: In this case study, find out how CCBC IT Service successfully reduced calls to the IT Service Desk with a self-service password reset tool. Learn how this strategy helped to maintain current call performance without increasing staffing levels.
Posted: 02 Jan 2018 | Published: 02 Jan 2018

Fast Pass Corp

GDPR Infographic
sponsored by Fast Pass Corp
RESOURCE: According to the Verizon Data Breach Investigations Report, 63% of confirmed data breaches involved weak, default, or stolen passwords. Take a closer look at this IDC infographic to uncover strategies for improving your IAM approach to become GDPR compliant.
Posted: 29 Dec 2017 | Published: 29 Dec 2017

Fast Pass Corp

Closing the Cloud Security Gap
sponsored by West UC
WHITE PAPER: According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

West UC

Omnichannel for Retail
sponsored by iovation, Inc.
WHITE PAPER: This resource explores the benefits of adopting multi-factor authentication strategies for mobile devices to improve security and enhance the user experience.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

iovation, Inc.

Why Device Risk is an Essential Element for Your MFA Strategy
sponsored by iovation, Inc.
WEBCAST: Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.
Posted: 13 Dec 2017 | Premiered: Oct 31, 2017

iovation, Inc.

Omnichannel Authentication
sponsored by iovation, Inc.
RESOURCE: While the current banking experience is a multichannel approach, which provides fast access, it does not provide a secure, effortless user experience. This resource provides insight into omnichannel authentication within mobile banking to help provide customers a seamless, effortless, high-quality experience, while maintaining security.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

iovation, Inc.

Report: IAM Leadership Compass
sponsored by Janrain
WHITE PAPER: This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Janrain

Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Janrain

Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

CW Europe – December 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 07 Dec 2017 | Published: 14 Dec 2017

ComputerWeekly.com

Key Considerations in Selecting a Customer IAM Solution
sponsored by Janrain
WHITE PAPER: The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Report: Customer Identity and Access Management
sponsored by Janrain
RESOURCE: In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.
Posted: 06 Dec 2017 | Published: 15 Jun 2017

Janrain

Top Trends That Will Shape CIAM in 2018 and Beyond
sponsored by Janrain
WHITE PAPER: In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Janrain

Executive Review: Consumer Identity and Access Management
sponsored by Janrain
WHITE PAPER: Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Janrain

Fighting Against Authorized Push Payment (APP) Scams
sponsored by HID Global
WHITE PAPER: This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.
Posted: 30 Nov 2017 | Published: 21 Nov 2017

HID Global

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID Global
WHITE PAPER: According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals 5 FAQs to help banking organizations make smart decisions when evaluating mobile banking security.
Posted: 20 Oct 2017 | Published: 31 Dec 2016

HID Global

3 Types of SSL Certificates
sponsored by HID Global
RESOURCE: Are you making the right choice when it comes to your SSL certificate? Take a look at this resource to gain insight into 3 types of SSL certificates to see if you are making the right choice specific to your business.
Posted: 20 Oct 2017 | Published: 13 Jul 2017

HID Global

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Don't Let SaaS Cloud Your Security
sponsored by Verizon
WHITE PAPER: The cloud is transforming all aspects of business, so the need for cloud security is more important than ever. Key into this white paper to discover 5 ways to stay secure in the cloud.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Verizon
76 - 100 of 521 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement