identity management

Results 301 - 325 of 347Sort Results By: Published Date | Title | Company Name
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : security, security management, access control, identity management, iam, authentication, tracking, workforce, workforce management, employee management, borer, access control, ip world, borer, borer data systems, office security, building security, card technology
     Borer Data Systems Ltd.
By: LifeLock     Published Date: Aug 23, 2016
Every employee has a risk of having their identity stolen. Provide your employees with identity theft management by offering LifeLock.
Tags : best practices, identity theft, security, protection, business technology
     LifeLock
By: Okta     Published Date: Nov 09, 2015
The adoption rate of Software as a Service (SaaS) applications has been dramatic. However, the tendency of SaaS applications to be siloed has made identity management, user access and authorization an increasing challenge. Read this whitepaper to learn the top three ways to extend Active Directory to your SaaS apps.
Tags : okta, active directory, cloud, cloud apps, saas, software as a service, identity management, it management, knowledge management, data management, data center
     Okta
By: Okta     Published Date: Oct 18, 2010
This paper will discuss three different options for integrating Active Directory with your SaaS applications and analyze how effectively they meet the requirements above.
Tags : okta, active directory integration, saas applications, software as a service, smb, identity management, iam, active directory, google apps, saas, cloud, sso, saml
     Okta
By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : network management, network security, access control, nac, network access control, identity management, security management, authentication, smart card, token, trusted network tech, security
     Trusted Network Tech
By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : access manager, identity federation, risk management, authentication capabilities, threat protection
     IBM
By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones — CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
     SailPoint Technologies
By: Kaspersky     Published Date: Jan 07, 2015
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.
Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach, security, virtualization, business technology
     Kaspersky
By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: Okta     Published Date: Jul 27, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
     Okta
By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity and access management, saas applications, single sign-on, active directory, management solutions
     Okta
By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
     OKTA
By: Okta     Published Date: Jan 30, 2013
This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : top 8, access management, challenges, saas applications, okta, it management, data management, business technology, data center
     Okta
By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: Okta     Published Date: Oct 12, 2010
This white paper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : okta, identity and access management, saas applications, iam, password fatigue, compliance, application integration, identity management, iam, active directory, google apps, saas, cloud, sso, saml
     Okta
By: VMware     Published Date: Feb 24, 2017
Cloud datacenter security is becoming imperative in the new age of malware attacks. To stay competitive and secure, organizations are turning to smart networking in an effort to close the datacenter security gap. The combination of VMware NSX, AirWatch Tunnel and Horizon View helps close this gap and simplifies security management for IT professionals. With the upcoming prevalence of authentication and identity management in an organization’s infrastructure, the need to delegate and define network access continues to highlight the important role of hybrid cloud security that addresses all end-user devices.
Tags : 
     VMware
By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
     IBM
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
     Illusive Networks
By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : ibm, security, identity management, insurance fraud, data protection, risk management
     IBM Software
By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : likewise, risk, compliance, sox, security
     Likewise Software
By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016
This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.
Tags : vasco, identitiy management, portal security, patient security, password protection, cybersecurity
     VASCO Data Security International, Inc.
By: BlackBerry Cylance     Published Date: Apr 26, 2019
The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. Each year, it attracts more than 8.2 million visitors on site and stages more than 2,000 performances attended by over 1.5 million people. Since opening its doors in 1973, the Opera House has become the symbol of modern Australia and the country’s premier tourist destination, with an iconic national-identity value that Deloitte Access Economics has estimated at $4.6 billion. On the Opera House’s 40th anniversary, it embarked on a Decade of Renewal, a series of projects to prepare the Opera House for future generations of artists, audiences, and visitors. Because renewal isn’t just about the building and the arts; it’s also about renewing technology and systems. This enabled the Opera House to engage VMtech and BlackBerry Cylance to modernize its IT server and network infrastructure, as well as information management, privacy, and cybersecurity.
Tags : 
     BlackBerry Cylance
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com