Authorization Research
-
Defining Identity Management
Sponsored by: Hitachi ID Systems, Inc.This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
-
How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
Sponsored by: BeyondTrust CorporationThis white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
-
Managing Identities and Access Control
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
-
Novell® Sentinel: Active Event Monitoring for Improved Security and Compliance Management
Sponsored by: Novell, Inc.Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
-
Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
Sponsored by: Dell SoftwareThis tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
-
Role Based Access Control and Entitlement Management
Sponsored by: FoxTThe new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.
-
Authentication in the Enterprise: Current and Changing Requirements
Sponsored by: PistolStar, Inc.This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
-
Fixing the "Everyone" Problem
Sponsored by: VaronisRead this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
-
eGuide: Essential Guide to Identity & Access Management
Sponsored by: Information Security MagazineThis essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
-
Software Testing eZine Vol.2 - Testing Strategies for Complex Environments: Agile, SOA
Sponsored by: TechTarget Software QualityIn this issue of SearchSoftwareQuality.com's Software Testing eZine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology.
-
IBM Optim Data Privacy Solution for SAP
Sponsored by: IBMThe IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing.
-
Get Ready for Master Data Management: Ten Things You Can Do Now
Sponsored by: KalidoThis paper explians in detail ten things you can do now to prepare for your master data management initiative.
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
-
EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard
Sponsored by: Qualys, Inc.The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks.
-
IFS Enterprise Asset Management - EAM/CMMS
Sponsored by: IFSIFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit.
-
The Case for Application Security: How Real Is the Threat and What Are Your Options
Sponsored by: Fortify SoftwareThis white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.