ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Management Software Research

  • Achieve secure mobile access to enterprise applications

    Sponsored by: Oracle Corporation UK Ltd

    This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.

  • Oracle Mobile and Social Service: The Next Step in IAM

    Sponsored by: Oracle Corporation UK Ltd

    As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.

  • How to Thwart Privilege Creep with Access Reviews

    Sponsored by: TechTarget Security

    In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.

  • Information Security Magazine - April 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • Presentation Transcript: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.

  • Business-Driven Identity and Access Management: Why This New Approach Matters

    Sponsored by: Aveksa

    This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.

  • Cybercrime Battle Basics

    Sponsored by: ThreatMetrix

    This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.

  • Oracle Identity Analytics- A Business Perspective

    Sponsored by: Oracle Corporation

    This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.

  • Forrester Report: The Total Economic Impact of Oracle Identity Manager

    Sponsored by: Oracle Corporation

    This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.

  • Help Strengthen Security by Building a Trusted Identity Environment

    Sponsored by: IBM

    As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.

  • Provide Access Control With Innovative Solutions From IBM

    Sponsored by: IBM

    Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.

  • Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives

    Sponsored by: IBM

    When IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.

  • Identity-Aware Networking

    Sponsored by: Extreme Networks

    When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.

  • Improving Identity and Access Management in an SAP Environment

    Sponsored by: Dell Software

    In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.

  • BeyondTrust 2009 Microsoft Vulnerability Analysis

    Sponsored by: BeyondTrust Corporation

    This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.

  • Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile

    Sponsored by: Hewlett Packard Enterprise

    This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure.

  • Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection

    Sponsored by: Panda Security

    Read this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.

  • Dell Asset Recovery Services

    Sponsored by: Dell, Inc. and Intel®

    To protect your company's assets and reputation, Dell's Asset Recovery Services help ensure that sensitive information does not fall into the wrong hands while also promoting environmental stewardship through our efforts to achieve zero-landfill and zero-export policies.

  • Buyer’s Guide for Enterprise Single Sign-On

    Sponsored by: Oracle Corporation

    This whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance.

  • eGuide: Essential Guide to Identity & Access Management

    Sponsored by: Information Security Magazine

    This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.

  • Presentation Transcript: Accelerating Return-On-Investment with Roles Management

    Sponsored by: Oracle Corporation

    This paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations.

  • Using Microsoft Active Directory in the Domino World

    Sponsored by: PistolStar, Inc.

    Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.

  • Readers' Choice Awards

    Sponsored by: Information Security Magazine

    Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.

  • On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck

    Sponsored by: Dell Software

    Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.

  • A Pathway to PCI Compliance

    Sponsored by: Imprivata

    This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.