Identification Systems Research
-
Computer Weekly – 10 July 2018: Tackling the digital identity problem
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.
-
Best Practices for Managing and Understanding Mobile Authentication
Sponsored by: TechTarget SecurityIn this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
-
WLAN Access Control and Wi-Fi Network Needs
Sponsored by: TechTarget SecurityThis white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
-
Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.
-
Identity and Access Management Tools to Look Out For
Sponsored by: OktaTechnologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.
-
Crafting an Identity-Based Security Strategy for Cloud
Sponsored by: Hewlett Packard EnterpriseIAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.
-
How to Craft SSO and IAM Strategies on the Cloud
Sponsored by: OneLoginIdentity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.
-
What to Look for in Multifactor Authentication Tools
Sponsored by: TechTarget SecurityIn our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
Sponsored by: IBMFind out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
A Guide to Password Use in WebSphere Application Server
Sponsored by: Global KnowledgeLearn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
-
IBM Security Priviledged Identity Management
Sponsored by: IBMThis quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
-
Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
Sponsored by: Celestix NetworksThis guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Beyond Passwords & Outdated Physical Access Systems
Sponsored by: Entrust, Inc.Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
-
Presentation Transcript: Automating Access Certification in Just 17 Days
Sponsored by: AveksaThis presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
-
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
Sponsored by: IntelUser provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
-
FlexNet Manager for SAP Business Suite Product Overview
Sponsored by: Flexera SoftwareFlexNet Manager for SAP Business Suite optimizes the SAP system measurement and checks for potential license savings. By checking the usage of each individual license, it determines whether the correct license type was purchased for a given user and whether enough licenses are available. This removes the guess work and optimizes license allocation.
-
Enabling Developer Access to Production Data
Sponsored by: Voltage Security, Inc.With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
-
Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
Sponsored by: Enigma, Inc.This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.