identity management

Results 301 - 325 of 335Sort Results By: Published Date | Title | Company Name
By: Hitachi ID Systems, Inc.     Published Date: Oct 20, 2010
This document defines the components of identity management
Tags : identity management, user provisioning, entitlements, password management, rbac
     Hitachi ID Systems, Inc.
By: Hitachi ID Systems     Published Date: Dec 20, 2010
IAM in the Cloud: an overview of technology and value
Tags : identity management, cloud computing, iam, security
     Hitachi ID Systems
By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication
     Confident Technologies
By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, it management, data management
     McAfee
By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : security, cloud, ibm, access management, identity management, governance, risk management, compliance
     IBM
By: IBM     Published Date: Jan 25, 2013
Educating Everyone To Guard the Cloud
Tags : security, cloud, ibm, access management, identity management, governance, risk management, compliance
     IBM
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, business technology, data center
     Courion
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, business technology, data center
     Courion
By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, security, business technology
     Courion
By: Courion     Published Date: Sep 29, 2012
This interactive session will explore the various roles and processes for managing user access, the benefits that automation can provide to better address this issue and provide guidance for implementing an effective strategy using a risk-driven approach.
Tags : courion, identity management, access management, security, it security, technology, automation
     Courion
By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : iag, identity and access governance, identity management, compliance, security, it management, business technology
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
Is change and complexity causing you to rethink your approach to identity, security and governance? Examine some of the challenges organizations face when developing and adapting a compliance program.
Tags : iag, identity management, access governance, it security, compliance, business technology
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : security and compliance in the cloud, business technology
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity as a service, authentication, authorization, open web, iam, saml, oauth, opened, scim, spml, xacml
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : iag, identity and access governance, identity management, compliance, security, it management
     NETIQ
By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
     JumpCloud
By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIron’s layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Apple’s Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
     MobileIron
By: IBM     Published Date: Jan 07, 2016
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations.
Tags : ibm, identity, access assurance, identity, security
     IBM
By: Okta     Published Date: Oct 30, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. However, Office 365 is unlike any other cloud app in it's complexity. Read this eGuide to learn how IT can eliminate the identity and mobility management that accompany an office 365 migration.
Tags : microsoft, cloud, office 365, cloud app, identity and mobility management, enterprise applications
     Okta
By: Okta     Published Date: Oct 30, 2015
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Read this whitepaper to learn how to eliminate the pitfalls that come with trying to build and manage multiple on-premises Active Directory integrations yourself.
Tags : active directory, identity & access management, eliminate pitfall, on-premises active directory, enterprise applications
     Okta
By: Okta     Published Date: Oct 30, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : okta, gartner, magic quadrant, identity and management, idaas, enterprise applications
     Okta
By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : okta, gartner, magic quadrant, identity and management, idaas, networking, security, it management, knowledge management, data management, business technology
     Okta
By: Okta     Published Date: Nov 03, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits.
Tags : okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits, networking, security, it management, knowledge management, data management
     Okta
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: IBM     Published Date: Sep 30, 2016
See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise’s data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more
Tags : ibm, security, office 365, access management deployment, access management, enterprise data, cloud, security measures, knowledge management, enterprise applications, data management, business technology
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com