Identity Management Software Research
-
How to Thwart Privilege Creep with Access Reviews
Sponsored by: TechTarget SecurityIn this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
-
New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
Sponsored by: TechTarget SecurityThis expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
-
Aligning Enterprise Identity and Access Management with CIO Priorities
Sponsored by: TechTarget SecurityIn this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
-
Complete and Scalable Access Management
Sponsored by: Oracle Corporation UK LtdThis comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
-
Achieve secure mobile access to enterprise applications
Sponsored by: Oracle Corporation UK LtdThis brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
-
Oracle Mobile and Social Service: The Next Step in IAM
Sponsored by: Oracle Corporation UK LtdAs cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
-
Information Security Magazine - April 2013
Sponsored by: TechTarget SecurityThis month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
-
Presentation Transcript: Automating Access Certification in Just 17 Days
Sponsored by: AveksaThis presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
-
Business-Driven Identity and Access Management: Why This New Approach Matters
Sponsored by: AveksaThis informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
-
Cybercrime Battle Basics
Sponsored by: ThreatMetrixThis paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
-
Oracle Identity Analytics- A Business Perspective
Sponsored by: Oracle CorporationThis white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
-
Forrester Report: The Total Economic Impact of Oracle Identity Manager
Sponsored by: Oracle CorporationThis report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
-
Help Strengthen Security by Building a Trusted Identity Environment
Sponsored by: IBMAs more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
-
Provide Access Control With Innovative Solutions From IBM
Sponsored by: IBMUnauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
-
Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives
Sponsored by: IBMWhen IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.
-
Identity-Aware Networking
Sponsored by: Extreme NetworksWhen you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
-
Improving Identity and Access Management in an SAP Environment
Sponsored by: Dell SoftwareIn this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
-
BeyondTrust 2009 Microsoft Vulnerability Analysis
Sponsored by: BeyondTrust CorporationThis report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
-
Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile
Sponsored by: Hewlett Packard EnterpriseThis white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure.
-
Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection
Sponsored by: Panda SecurityRead this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.
-
Dell Asset Recovery Services
Sponsored by: Dell, Inc. and Intel®To protect your company's assets and reputation, Dell's Asset Recovery Services help ensure that sensitive information does not fall into the wrong hands while also promoting environmental stewardship through our efforts to achieve zero-landfill and zero-export policies.
-
Buyer’s Guide for Enterprise Single Sign-On
Sponsored by: Oracle CorporationThis whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance.
-
eGuide: Essential Guide to Identity & Access Management
Sponsored by: Information Security MagazineThis essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
-
Presentation Transcript: Accelerating Return-On-Investment with Roles Management
Sponsored by: Oracle CorporationThis paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations.