access management

Results 326 - 350 of 499Sort Results By: Published Date | Title | Company Name
By: Litmos     Published Date: Apr 27, 2015
Read this case study to learn why Bigger Brains decided that Litmos was the best solution in the eLearning space for them to partner with. Some of the key drivers that led Bigger Brains to select Litmos include: • Ease of use • Extensive API support • Best value LMS considering price, features, and support
Tags : elearning, accessibility, usability, learning management system
     Litmos
By: JumpCloud     Published Date: Sep 29, 2014
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
     JumpCloud
By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services, security, enterprise applications
     ForgeRock
By: ForgeRock     Published Date: Oct 08, 2014
Customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before. Forrester finds that to achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity. Fortunately, a new consumer-facing solution is gaining currency and has earned a name unto itself: Identity Relationship Management.
Tags : customer focused, content, access management, consumer-facing solution, iam platform, enterprise applications
     ForgeRock
By: ForgeRock     Published Date: Mar 10, 2015
In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).
Tags : iam, irm, forrester, forgerock, platforms, relationship management, software development
     ForgeRock
By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : iam, forgerock, irm, relationship management, software development
     ForgeRock
By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : rackspace, cloud, application, software development, security
     Rackspace
By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
     Tripwire
By: IBM     Published Date: Nov 14, 2014
A recent study completed by Ventana Research found that 68% of companies are using predictive analytics to gain a competitive edge. Find out more now, and learn how predictive analytics can help you.
Tags : ibm, ventana, deployment, predictive analytics, forecasting, accessing data, business management, data management
     IBM
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
     Symantec
By: IBM MaaS360     Published Date: Apr 04, 2016
Learn how to become an enterprise mobility Mowglie. In today’s completely connected mobile jungle, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses to survive and deliver an optimal experience. The MaaS360 suite from IBM allows for a robust app development platform where users can become mobile Mowglies and increase portability and interoperability. Download this e-book to create a failsafe Enterprise Mobility Survival Guide and build the best mobile environment for your users and employees.
Tags : ibm, mobile, management, guide, app development, networking, it management, business technology, data center
     IBM MaaS360
By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : ibm security, access management solutions, mobile channel security, advanced threats, byod, security, it management
     IBM
By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : cloud environment, iaas, paas, saas, access management, security, it management, business technology
     IBM
By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management, data management
     IBM
By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, security, it management, knowledge management, data management
     IBM
By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility, security, networking, it management, wireless, knowledge management, data management
     IBM
By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : ibm, continuous compliance, reduced risk, security, threat intelligence, iam, data management, business technology
     IBM
By: IBM     Published Date: Jul 15, 2016
Discover how an integrated approach to access management can reduce complexity and thwart security breaches
Tags : security, technology, access management, security breaches, business technology
     IBM
By: IBM     Published Date: Jul 15, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : ibm, security, access manager, best practices
     IBM
By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : ibm, security, security access manager, federation capabilities, risk management, best practices, technology, it management, business technology
     IBM
By: IBM     Published Date: Sep 30, 2016
Discover how an integrated approach to access management can reduce complexity and thwart security breaches
Tags : ibm, security, access management, access manager, enterprise applications, business technology
     IBM
By: IBM     Published Date: Sep 30, 2016
Having an integrated approach to access management for mobile, web and cloud applications is essential to taking control of access management.
Tags : ibm, security, access management, access manager, integrated access management, knowledge management, enterprise applications, business technology
     IBM
By: IBM     Published Date: Sep 30, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : ibm, security, access management, access manager, kuppingercole, leadership compass, knowledge management, enterprise applications, business technology
     IBM
By: IBM     Published Date: Jul 31, 2018
Simplify and secure identity and access management with IBM Cloud Identity for single sign-on, seamless access and improved efficiency.
Tags : 
     IBM
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com