Identity Management Research
-
Cloud Identity Buyer’s Guide
Sponsored by: IntelThis guide discusses the issue of identity and access management (IAM) for cloud applications. It outlines the issues that need to be addressed, suggests some approaches to solving those issues and provides an overview of the Intel products that help companies manage their SaaS application identities more effectively and efficiently.
-
Presentation Transcript: Cloud Computing Security and Regulatory Compliance
Sponsored by: DellEMC and Intel®This presentation transcript, featuring Jim Reavis of the Cloud Security Alliance, offers advice on how to secure your cloud. Reavis discusses high level vs. detailed cloud security frameworks and suggests questions to ask potential cloud vendors.
-
Beverly Hills Wealth Management Case Study
Sponsored by: IntelRead this case study and learn how and why Beverly Hills Wealth Management, a Registered Investment Advisor Firm, selected Intel's Identity and Access Management Solution that combines single sign-on, user account provisioning/deprovisioning, and access management for its users.
-
Cybercrime Battle Basics
Sponsored by: ThreatMetrixThis paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
-
E-Guide: Achieving compliance through IAM
Sponsored by: TechTarget SecurityRead this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations.
-
E-Guide: IAM in the cloud
Sponsored by: TechTarget SecurityWhen bringing your organization into the cloud, there are a few steps that need to be taken in order to ensure security. One of the main areas that needs to be appropriately integrated is identity management. Read this expert E-Guide and discover how to manage identity in the cloud, along with whom and what you can trust in the cloud.
-
Understanding, Building and Securing an IAM Cloud Architecture
Sponsored by: OneLoginThis presentation transcript will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.
-
IT in Europe: Breaking the Code: Are passwords destined for obscurity?
Sponsored by: TechTarget ComputerWeekly.comThis feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
-
The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
Sponsored by: IntelCloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
-
Adaptive Strong Auth & Federated SSO - The New Power Couple
Sponsored by: IntelWeak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
-
E-Guide: Are 'strong authentication' methods strong enough for compliance?
Sponsored by: TechTarget SecurityAlthough strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
-
Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now.
-
SearchSecurity.com E-Guide: The critical role of privileged account management in data security
Sponsored by: IBMPrivileged accounts are extremely difficult to secure and now represent the biggest threat to today’s enterprises. This expert tip discusses the technology and strategies available to help organizations take better control over privileged accounts.
-
E-Guide: IAM - Key concepts and predictions for 2011
Sponsored by: CA TechnologiesThis expert e-guide discusses key trends that will significantly impact identity and access management concepts in 2011, and highlights the critical questions any organization must ask when selecting an IAM product.
-
Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive
Sponsored by: IBMThis paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action.
-
3 undeniable use cases for automated IAM controls
Sponsored by: IBMThis white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity.
-
Managing data and application security risks cost effectively
Sponsored by: IBMThis whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit.
-
Wave Methodology- A Practical Guide to Defining Roles for Access Control
Sponsored by: Oracle CorporationAs the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
-
Oracle Identity Analytics- A Business Perspective
Sponsored by: Oracle CorporationThis white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
-
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
Sponsored by: IntelUser provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
-
Taking Control of the Cloud for Your Enterprise - Addressing Security, Visibility, and Governance Challenges
Sponsored by: IntelIt comes as no surprise that some businesses are reluctant to implement cloud-based services. Security risks are a major concern due to the lack of control a business faces when moving critical business systems to the cloud. Find out how to avoid security risks while still taking advantage of the benefits of cloud computing.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
Sponsored by: IntelTraditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
-
End-to-End Secure Client to Cloud Access Presentation Transcript
Sponsored by: IntelIn this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud.
-
Better Leveraging Active Directory
Sponsored by: Radiant Logic, Inc.Find out how your business can have a better and more efficient identity management system in this white paper.
-
Forrester Report: The Total Economic Impact of Oracle Identity Manager
Sponsored by: Oracle CorporationThis report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.