identity and access management

Results 1 - 25 of 146Sort Results By: Published Date | Title | Company Name
By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.
Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management
     EMC Corporation
By: IronStratus     Published Date: Apr 10, 2012
With all their benefits, cloud applications increase passwords and decrease IT control over user access, compromising security. Register for a free IronStratus account and start securely managing access to all your cloud applications in minutes.
Tags : cloud, single sign on, single sign-on, apps, application, access, password, encryption, soo, login, identity management, identity and access management, access, access management
     IronStratus
By: ForgeRock     Published Date: Jul 09, 2015
In the great Internet of Things (IoT) gold rush, early adopters have largely left behind identity and access management. As a result, many organizations are scrambling to deal with the consequences. Successful IoT implementations have complex relationships to people, things, and services, and the only sustainable and secure method for securing the IoT long term is to enable persistent identity across applications, devices, and things.
Tags : idot, aim, lot, forgerock, applications, access management, architecture
     ForgeRock
By: Okta     Published Date: Oct 30, 2015
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Read this whitepaper to learn how to eliminate the pitfalls that come with trying to build and manage multiple on-premises Active Directory integrations yourself.
Tags : active directory, identity & access management, eliminate pitfall, on-premises active directory
     Okta
By: Okta     Published Date: Nov 09, 2015
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Read this whitepaper to learn how to eliminate the pitfalls that come with trying to build and manage multiple on-premises Active Directory integrations yourself.
Tags : okta, active directory, ldap, identity and access management
     Okta
By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security, saas, saas security
     Centrify
By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
     KPMG
By: Akamai Technologies     Published Date: Jul 25, 2019
Das Customer Identity and Access Management (CIAM) spielt für Marken, die ihren anspruchsvollen Kunden ein nahtloses, sicheres digitales Erlebnis bieten wollen, eine immer größere Rolle. Als Teil des Identity and Access Management Playbook bietet Forrester Research Unterstützung beim Aufbau eines kundenorientierten IAM-Teams, das über die nötigen technischen Fähigkeiten, Geschäftspraktiken und zwischenmenschlichen Eigenschaften verfügt, um eine CIAM-Strategie zu entwerfen und sie über verschiedene Funktionsgruppen hinweg zu implementieren. Lesen Sie den vollständigen Bericht, um zu erfahren, was Sie bei der effektiven Gestaltung eines CIAM-Teams berücksichtigen sollten. Die Kernpunkte des Berichts: ? Vier wichtige Rollen für Ihr CIAM-Team ? Warum die gemeinsame Nutzung und Integration von Kundendaten über Unternehmensgrenzen hinweg entscheidend für den Erfolg ist ? Die wichtigsten technischen, geschäftlichen und zwischenmenschlichen Fähigkeiten, die die Mitglieder Ihres CIAM-Teams mit
Tags : 
     Akamai Technologies
By: NetIQ     Published Date: Nov 05, 2012
An analysis of the annual Gartner survey of CIOs' most urgent priorities identifies the business and technology concerns where identity and access management has business-relevant impacts.
Tags : gartner, iam, identity and access management, cio, business priorities, iam initiatives, security
     NetIQ
By: Ping Identity     Published Date: Jan 29, 2013
Corporate security compliance requirements are driving new demands/requirements for identity and access management (IAM). Learn how you can extend your enterprise beyond the perimeter with stronger security, less risk and higher efficiency.
Tags : access management, age of cloud computing, cloud, ping, iam, enterprise security, security
     Ping Identity
By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
     Aveksa
By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     CA Technologies
By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
     Akamai Technologies
By: NETIQ     Published Date: Jun 20, 2014
Having identity and access management solutions is a must these days. But what happens when someone gets around your solution?
Tags : netiq, api, hijacking, cyberthreats, insider credentials, security
     NETIQ
By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : device management, security management, mobility, application security, management solutions
     Centrify
By: Okta     Published Date: Mar 10, 2016
LinkedIn sees cost and time benefits from Okta’s on-demand identity and access management service; securely integrating their cloud applications with Active Directory, single sign-on, and provisioning reports.
Tags : 
     Okta
By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
     F5 Networks Inc
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : idaas, cloud based identity, access management, iam, identity governance functionality
     IBM
By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud, password
     Okta
By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
     McAfee
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
For financial institutions, IBM access management solutions can ease regulatory compliance and provide user-centric authentication options.
Tags : compliance-proof, access management, user-centric authentication, regulatory compliance
     Group M_IBM Q1'18
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection
     CA Technologies
By: IBM     Published Date: Apr 23, 2018
To assist IAM leaders with their IDaaS vendor selection process, Gartner evaluated 18 vendors' services in this research using 11 critical capabilities and three common use cases: workforce to SaaS, business-to-consumer and traditional/legacy workforce.
Tags : idaas, ibm cloud identity service
     IBM
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com