identity governance

Results 1 - 25 of 44Sort Results By: Published Date | Title | Company Name
By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
     SailPoint
By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
     SailPoint
By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
     SailPoint
By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
     NetIQ
By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : identity governance, security threats, user access, cloud security, identity management
     IBM
By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders, in-house deployments, cost of ownership, external interaction, identifiable data, security services, access management, identity governance, drivers and blockers
     CA Technologies
By: SailPoint     Published Date: Feb 08, 2011
This guide is designed to help ensure a successful identity governance strategy can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Tags : sailpoint, identity governance, compliance, risk management, access management, password management, reporting and analytics
     SailPoint
By: Okta     Published Date: Jul 25, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable.
Tags : okta, best practices, technology, optimization, identity governance, cloud computing
     Okta
By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper to learn how you can meet the growing needs of both your Identity Management systems and Access Governance systems by bringing business and IT together.
Tags : iag, identity and access governance, identity management, compliance, security
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : iag, identity management, access governance, it security
     NetIQ
By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
     Okta
By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : identity governance, iam, identity management, user-centric security
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Feb 12, 2019
Test your knowledge. Read the top 5 myths about identity governance and discover if what you believe is actually true or false.
Tags : identity governance, iam, identity management, provisioning, role management, cloud identity
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Feb 12, 2019
Read this white paper to learn how enterprise security has become user-centric and why identity governance is the key to preventing data breaches.
Tags : identity governance, iam, identity management
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Mar 25, 2019
Digital transformation requires news ways to ensure cybersecurity and compliance. Find out why top senior technology executives call identity governance the great enabler.
Tags : cyberattacks, cybersecurity
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Apr 10, 2019
Today’s businesses are more interconnected and vulnerable to security threats. Read the top 6 reasons why identity governance can help protect organizations of any size stay protected.
Tags : 
     SailPoint Technologies
By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
     NETIQ
By: NETIQ     Published Date: Jan 12, 2017
Our analysis of the survey findings indicates that as enterprise organizations attempt to respond to the need to provide more access to more information online, the ability to govern that access is being strained to a breaking point.
Tags : 
     NETIQ
By: Microsoft Azure     Published Date: Apr 11, 2018
While it’s clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. You’ll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
     Microsoft Azure
By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution, security
     K2
By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : ibm security, business-centric strategies, security solutions, it policies, security
     IBM
By: IBM     Published Date: Jul 31, 2015
Governance solutions.
Tags : identity, protection, critical, solution
     IBM
By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : ibm, continuous compliance, reduced risk, security, threat intelligence, iam
     IBM
By: IBM     Published Date: Jan 07, 2016
See why Gartner selects IBM as an IGA leader in the 2016 report.
Tags : ibm, gartner, magic quadrant, identity governance, administration, security
     IBM
By: IBM     Published Date: Jan 15, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : ibm, identity governance, security, protection
     IBM
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com