identity governance

Results 1 - 25 of 46Sort Results By: Published Date | Title | Company Name
By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
     SailPoint
By: SailPoint Technologies     Published Date: Feb 12, 2019
Test your knowledge. Read the top 5 myths about identity governance and discover if what you believe is actually true or false.
Tags : identity governance, iam, identity management, provisioning, role management, cloud identity
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Mar 25, 2019
Digital transformation requires news ways to ensure cybersecurity and compliance. Find out why top senior technology executives call identity governance the great enabler.
Tags : cyberattacks, cybersecurity
     SailPoint Technologies
By: Microsoft Azure     Published Date: Apr 11, 2018
While it’s clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. You’ll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
     Microsoft Azure
By: SailPoint Technologies     Published Date: Apr 10, 2019
Today’s businesses are more interconnected and vulnerable to security threats. Read the top 6 reasons why identity governance can help protect organizations of any size stay protected.
Tags : 
     SailPoint Technologies
By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
     NETIQ
By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : idaas, cloud based identity, access management, iam, identity governance functionality
     IBM
By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don’t retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : ibm, security, identity governance and intelligence, identity governance, entitlements, compliance, enterprise applications, business technology
     IBM
By: IBM     Published Date: Oct 26, 2017
Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.
Tags : identity governance, entitlements, authorized users, orphan accounts, business activities
     IBM
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : security identity governance, access governance
     Group M_IBM Q1'18
By: IBM     Published Date: Jan 07, 2016
See why Gartner selects IBM as an IGA leader in the 2016 report.
Tags : ibm, gartner, magic quadrant, identity governance, administration, networking, security
     IBM
By: NETIQ     Published Date: Jan 12, 2017
Our analysis of the survey findings indicates that as enterprise organizations attempt to respond to the need to provide more access to more information online, the ability to govern that access is being strained to a breaking point.
Tags : 
     NETIQ
By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : security, cloud, ibm, access management, identity management, governance, risk management, compliance
     IBM
By: IBM     Published Date: Jan 15, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations.
Tags : ibm, identity governance, compliance, risk control, security, enterprise applications, business technology
     IBM
By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : ibm, identity governance, risk control, risk management, data security, security, knowledge management, enterprise applications
     IBM
By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : identity governance, iam, identity management, user-centric security
     SailPoint Technologies
By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : ibm security, business-centric strategies, security solutions, it policies, security, it management
     IBM
By: IBM     Published Date: Apr 23, 2018
IBM Cloud Identity Service is helping businesses simplify Identity and Access Management (IAM) through a cloud-delivered service (IDaaS). IBM Cloud Identity Service combines the full spectrum of IAM, including federation, web access management, and identity governance with the speed, agility, and lower cost of the cloud. This video demonstrates how to rapidly integrate SaaS and other third-party applications using the "Quick Connect" feature within the IBM Cloud Identity Service and securely connect people and applications to the cloud.
Tags : idaas, ibm cloud identity service
     IBM
By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper to learn how you can meet the growing needs of both your Identity Management systems and Access Governance systems by bringing business and IT together.
Tags : iag, identity and access governance, identity management, compliance, security, it management, business technology
     NetIQ
By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : iag, identity and access governance, identity management, compliance, security, it management, business technology
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : iag, identity and access governance, identity management, compliance, security, it management
     NETIQ
By: Group M_IBM Q418     Published Date: Oct 02, 2018
IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : identities, manage identities, manage application access, application access
     Group M_IBM Q1'18
By: IBM     Published Date: Apr 04, 2016
The right identity governance and administration solution can help you control access risks and segregation-of-duties violations. It can help you manage user roles, access policies and risk - so you can apply and enforce appropriate levels of access across your enterprise.
Tags : ibm, data security, risk management, data management, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : ibm, security, identity governance and intelligence, identity governance, enterprise applications, business technology
     IBM
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com