Identity Management Research
-
E-Guide: Uniting SIM and IAM to Boost Security
Sponsored by: TechTarget SecurityWhen logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
-
Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
Sponsored by: Google AppsToday's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
-
Solution Brief: Managing the WAN to Optimize Business
Sponsored by: BlueCoatBandwidth management is a common technique employed by IT organizations to improve quality of service over the WAN. It typically involves assigning guaranteed levels of bandwidth and traffic prioritization to improve application performance.
-
Adaptive Access Management: An ROI Study
Sponsored by: Oracle CorporationSecurity solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.
-
Simplify Security for REST and WS* Web Services: The Gateway Approach
Sponsored by: IntelThis solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
-
Tackling the Top Five Network Access Control Challenges
Sponsored by: Juniper Networks, Inc.In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
-
E-Guide: How to tie SIM to identity management for security effectiveness
Sponsored by: TechTarget SecuritySecurity information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
-
Forrester Study: The Total Economic Impact of Oracle Identity Analytics
Sponsored by: Oracle CorporationBased on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution.
-
Access Certification: Addressing and Building on a Critical Security Control
Sponsored by: Oracle CorporationThis white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
-
Presentation Transcript: Changing Authentication Options
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
-
Presentation Transcript: Risk Mitigation – Bang for the Buck
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
-
EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
Sponsored by: Oracle CorporationIT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
-
Evolve Your Sitemider Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration
Sponsored by: Radiant Logic, Inc.Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
-
Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
Sponsored by: Radiant Logic, Inc.This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
-
Expert E-Book: Data Security and the Cloud
Sponsored by: TechTarget SecurityThis e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
-
Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
Sponsored by: Google AppsToday's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
-
IBM Point of View: Security and Cloud Computing
Sponsored by: IBMCloud Computing is easy to deploy, flexible and cost-effective. As federal agencies continue to outsource data management and operations to third-party cloud providers, their ability to ensure data integrity and privacy is becoming a potential security risk. Read this white paper to learn how you can manage Cloud Computing safely and efficiently.
-
Help Strengthen Security by Building a Trusted Identity Environment
Sponsored by: IBMAs more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
-
Provide Access Control With Innovative Solutions From IBM
Sponsored by: IBMUnauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
-
Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives
Sponsored by: IBMWhen IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.
-
E-Book: Technical Guide on Managing Identities and Access Control
Sponsored by: CA TechnologiesSearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
-
Implementing Database Security and Auditing: Using Granular Access Control
Sponsored by: Guardium, an IBM CompanyIn this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system.
-
Your September Issue of Information Security Magazine– Readers’ Choice Awards
Sponsored by: Information Security MagazineIn this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
-
E-Book: Red Flag Rules Compliance
Sponsored by: GemaltoSearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
-
Database Security: Audit and Protect Critical Databases
Sponsored by: ImpervaDatabases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.