identity management

Results 301 - 325 of 332Sort Results By: Published Date | Title | Company Name
By: Okta     Published Date: Jan 30, 2013
This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : top 8, access management, challenges, saas applications, okta, it management, data management, business technology, data center
     Okta
By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: Okta     Published Date: Oct 12, 2010
This white paper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : okta, identity and access management, saas applications, iam, password fatigue, compliance, application integration, identity management, iam, active directory, google apps, saas, cloud, sso, saml
     Okta
By: VMware     Published Date: Feb 24, 2017
Cloud datacenter security is becoming imperative in the new age of malware attacks. To stay competitive and secure, organizations are turning to smart networking in an effort to close the datacenter security gap. The combination of VMware NSX, AirWatch Tunnel and Horizon View helps close this gap and simplifies security management for IT professionals. With the upcoming prevalence of authentication and identity management in an organization’s infrastructure, the need to delegate and define network access continues to highlight the important role of hybrid cloud security that addresses all end-user devices.
Tags : 
     VMware
By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
     IBM
By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : ibm, security, identity management, insurance fraud, data protection, risk management
     IBM Software
By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : likewise, risk, compliance, sox, security
     Likewise Software
By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016
This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.
Tags : vasco, identitiy management, portal security, patient security, password protection, cybersecurity
     VASCO Data Security International, Inc.
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: Iovation     Published Date: Oct 21, 2009
With device reputation, WagerWorks gained valuable insight into the account activity on its sites, and as a result achieved greater control over fraud and abuse. By easily identifying account-device relationships and providing data for in-depth forensic analysis, iovation ReputationManager proved to be the most important addition to the company's overall fraud prevention process
Tags : wagerworks, iovation, fraud prevention, security, identity management, compliance, online gaming abuse
     Iovation
By: Janrain     Published Date: Apr 12, 2016
Now more than ever, customer loyalty and business revenue rely on hyper-personalized engagement. To resolve these issues and remain focused on their core responsibilities, IT professionals are turning to Customer Identity and Access Management (CIAM) platforms.
Tags : janrain, customer identity, access management, ciam, customer service, records management, business technology
     Janrain
By: Group M_IBM Q1'18     Published Date: Mar 26, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : identity management, idaas, cloud applications, ibm cloud identity
     Group M_IBM Q1'18
By: Lieberman Software     Published Date: Mar 27, 2012
Download "Privileged Identity Management: An Executive Overview" to learn where privileged identities can be found on your network; the challenges to discover, secure and manage them; and why unsecured privileged account credentials are dangerous.
Tags : privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security, security
     Lieberman Software
By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication
     Confident Technologies
By: VMware AirWatch     Published Date: Sep 16, 2015
This whitepaper shows how AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 APIs and VMware Identity Manager, or your on-premise identity management or cloud, to optimize UX and ensure your data is secure across all devices and platforms.
Tags : airwatch, emm, office365, cloud, software development, it management, wireless, knowledge management, enterprise applications, platforms, data management, business technology
     VMware AirWatch
By: Okta     Published Date: Jul 27, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: Gigya     Published Date: Jun 08, 2015
Customer Identity Management provides the tools you need to drive registrations, manage customer data and use it to improve cross-channel customer experiences and relationships. Know your customers on a deeper level Get a single customer view across channels Turn data into relationships and results
Tags : customer identity management, customer data, cross-channel customer experience, drive registrations, enterprise applications
     Gigya
By: Lieberman Software     Published Date: Mar 27, 2012
Download "Why Privileged Identity Management Implementations Fail" to learn how to quickly implement a solution that can both lower your IT staff's workload and protect access to your organization's most sensitive data.
Tags : security
     Lieberman Software
By: Rackspace     Published Date: Mar 08, 2016
Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective
Tags : organization, identity solutions, cloud management, access management
     Rackspace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com