identity management

Results 301 - 325 of 347Sort Results By: Published Date | Title | Company Name
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
     Centrify Corporation
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
     Centrify Corporation
By: Iovation     Published Date: Oct 21, 2009
With device reputation, WagerWorks gained valuable insight into the account activity on its sites, and as a result achieved greater control over fraud and abuse. By easily identifying account-device relationships and providing data for in-depth forensic analysis, iovation ReputationManager proved to be the most important addition to the company's overall fraud prevention process
Tags : wagerworks, iovation, fraud prevention, security, identity management, compliance, online gaming abuse
     Iovation
By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing, remote, data loss, critical information, private information, customer information, identity management, dlp, data loss protection, mfps, it infrastructure, authentication, mps
     Quocirca
By: IBM     Published Date: Oct 15, 2009
In the white paper, "Toward Transparency and Sustainability: Building a New Financial Order," you'll see how businesses are building sustainable, stable systems for the years to come, while fulfilling their brand promises.
Tags : global financial market, ibm, identity crisis, processors, over-the-counter, otc, market capitalization, banking system, financial architecture, roi, spend management
     IBM
By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
     IBM
By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10, a10 networks, sox compliance, it management
     A10 Networks
By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
     A10 Networks
By: A10 Networks     Published Date: Aug 21, 2009
Troubleshooting network and security problems in a time of crisis is never easy and the need to resolve mysterious machine addresses such as MAC and IP Addresses back to individuals or hosts is often difficult and time consuming. Download this solution sheet and see how A10 Networks' IDentity Proxy Service can automate the task of resolving host addresses back to individuals to speed network and security troubleshooting and forensics.
Tags : ip address, identity, network security, identity management, mac address, network management, troubleshoot, a10, a10 networks
     A10 Networks
By: IDFocus     Published Date: Aug 21, 2009
This whitepaper describes our unique approach and methodology for delivering an enterprise-wide Identity and Access Management solution. Our methodology, IDMology, offers pre-defined solutions to repeatable problems occurring during the lifecycle of an Identity Management project.
Tags : identity management, access management, iam, identity and access maangement, idmology, idfocus, project management, project lifecycle management, roi, return on investment
     IDFocus
By: IDFocus     Published Date: Aug 21, 2009
HRFeed is one of the most critical elements of every Identity Management or User Provisioning solution. This document outlines the different business and technical challenges that IDFocus faced when building successful HR-to-Provisioning integration for several clients.
Tags : identity management, human resources, hrfeed, identity management, user provisioning, system integration, idfocus
     IDFocus
By: IDFocus     Published Date: Aug 21, 2009
In the Identity Management space, there are 3 leading applications: Web access control, single sign-on, and password management. The document also describes two alternative approaches to combining these solutions.
Tags : password management, identity management, access management, iam, identity and access management, single sign on, single sign-on, access control, idfocus
     IDFocus
By: Okiok     Published Date: Aug 21, 2009
To successfully deploy Single Sign-On today, most organizations have a set of key requirements that must be met. Here are some tips on how focal Point can help organizations seeking Single Sign-On meet those requirements.
Tags : single sign on, sso, sso deployment, single sign on deployment, authentication, identity management, okiok
     Okiok
By: PassGo     Published Date: Aug 21, 2009
Historically, before computers and the Internet, business transactions were conducted face to face; establishing your partner's identity in such situations presented few problems. As human beings, we are well equipped to discern the extraorginarily subtle variations of the human face and voice to enable positive recognition and identification of our partner.
Tags : token, tokens, authentication, password management, pki, identity management, identification, business transaction, online business transaction, passgo, pass go, security
     PassGo
By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : network management, network security, access control, nac, network access control, identity management, security management, authentication, smart card, token, trusted network tech, security
     Trusted Network Tech
By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security, threats, vulnerabilities, silo data, business processes, business users, security, swg
     IBM
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs, security, compliance, regulatory audits, forensics, investigations, log analysis
     ArcSight
By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : likewise, risk, compliance, sox, security
     Likewise Software
By: thawte     Published Date: Aug 27, 2008
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
Tags : thawte, ssl, secure socket, authentication, identity management, identification
     thawte
By: Entrust Datacard     Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
Tags : entrust identityguard, versatile authentication platform, entrust, authentication, password management, identity management, iam, internet security, online security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam
     Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com