Identity Management Research
-
Identity Management: Implementation And System Support
Sponsored by: OpenIAMIn this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
-
IAM Evaluation And Deployment Guidelines
Sponsored by: OpenIAMRead this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
-
2014 Magic Quadrant for User Authentication
Sponsored by: SafeNet Asia LtdView this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
-
Extending Role Security in Analysis Services for SQL Server
Sponsored by: Global KnowledgeThis step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
-
Cloud Security as a Service For Secure Cloud-Based Server Hosting
Sponsored by: TechTarget SecurityAccess this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.
-
For Secure Access, Passwords Alone Do Not Work
Sponsored by: VerizonThis informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Avoiding Insider Threats to Enterprise Security
Sponsored by: IBMThis white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
-
Okta Active Directory Integration - An Architecture Overview
Sponsored by: OktaThis white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
-
Mitigating Insider Threats
Sponsored by: IBMThis exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
-
A Foundation for Next-Generation Data Center Security
Sponsored by: CitrixThis white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
-
Stopping Privilege Creep: Limiting User Privileges with Access Reviews
Sponsored by: TechTarget SecurityThis SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
-
Extended Enterprise Poses Identity and Access Management Challenges
Sponsored by: TechTarget SecurityInside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
-
Handbook: Identity and Access Management
Sponsored by: TechTarget SecurityIn this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
-
Symantec Intelligence Report – May 2013
Sponsored by: Symantec CorporationKeeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
-
Global Security University: IAM Integration Classroom
Sponsored by: IBMThis Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
-
Cloud App Success Means End-User Identity Management
Sponsored by: VMware, Inc.This e-guide takes a deeper look at whether roaming profiles can increase the use and mobility of a cloud app among providers and discusses the impacts of end-user identity management on the success of your cloud apps.
-
Identity and Access Management Buyer's Guide
Sponsored by: IBMThis buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
-
Best Practices for Managing and Understanding Mobile Authentication
Sponsored by: TechTarget SecurityIn this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
-
How to tackle cloud, IAM, and digital certificate problems in your organization
Sponsored by: TechTarget SecurityIn this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise.
-
What you didn’t know about Certificate-Based Authentication
Sponsored by: OpenTrustYou may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
-
Identity Management in the Cloud Era
Sponsored by: TechTarget Search Windows ServerThis expert cloud handbook presents the latest approaches to identity management in today's cloud and mobile IT era. Learn more about re-assessing your identity management strategy, how Windows Server 2012 enables Active Directory cloud deployments, SaaS tools for improved identity management and much more.
-
Computer Weekly – 11 June 2013: Do you know who is on your network?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our latest buyer's guide looks at how identity and access management can improve your information security. We go behind the scenes at Microsoft HQ to find out how the software giant deals with product security. And the CIO from Domino's Pizza tells us why the retailer is moving to the cloud. Read the issue now.
-
Identity and Access Management Security Live Chat Transcript
Sponsored by: SailPoint TechnologiesIn this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
-
WLAN Access Control and Wi-Fi Network Needs
Sponsored by: TechTarget SecurityThis white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.