identity governance

Results 26 - 46 of 46Sort Results By: Published Date | Title | Company Name
By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, enterprise applications
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper to learn how you can meet the growing needs of both your Identity Management systems and Access Governance systems by bringing business and IT together.
Tags : iag, identity and access governance, identity management, compliance, security, it management, business technology
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : iag, identity management, access governance, it security, business technology
     NetIQ
By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : iag, identity and access governance, identity management, compliance, security, it management, business technology
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
Is change and complexity causing you to rethink your approach to identity, security and governance? Examine some of the challenges organizations face when developing and adapting a compliance program.
Tags : iag, identity management, access governance, it security, compliance, business technology
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : iag, identity and access governance, identity management, compliance, security, it management
     NETIQ
By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
     NETIQ
By: NETIQ     Published Date: Jan 12, 2017
Our analysis of the survey findings indicates that as enterprise organizations attempt to respond to the need to provide more access to more information online, the ability to govern that access is being strained to a breaking point.
Tags : 
     NETIQ
By: Okta     Published Date: Jul 25, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable.
Tags : okta, best practices, technology, optimization, identity governance, cloud computing, business technology
     Okta
By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
     Okta
By: SailPoint     Published Date: Feb 08, 2011
This guide is designed to help ensure a successful identity governance strategy can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Tags : sailpoint, identity governance, compliance, risk management, access management, password management, reporting and analytics
     SailPoint
By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
     SailPoint
By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
     SailPoint
By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
     SailPoint
By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : identity governance, iam, identity management, user-centric security
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Feb 12, 2019
Test your knowledge. Read the top 5 myths about identity governance and discover if what you believe is actually true or false.
Tags : identity governance, iam, identity management, provisioning, role management, cloud identity
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Feb 12, 2019
Read this white paper to learn how enterprise security has become user-centric and why identity governance is the key to preventing data breaches.
Tags : identity governance, iam, identity management
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Mar 25, 2019
Digital transformation requires news ways to ensure cybersecurity and compliance. Find out why top senior technology executives call identity governance the great enabler.
Tags : cyberattacks, cybersecurity
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Apr 10, 2019
Today’s businesses are more interconnected and vulnerable to security threats. Read the top 6 reasons why identity governance can help protect organizations of any size stay protected.
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones — CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
     SailPoint Technologies
Previous    1 2     Next   
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com