identity solutions

Results 26 - 50 of 51Sort Results By: Published Date | Title | Company Name

Trust but verify.managing and auditing privileged users

Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati, application security, auditing, compliance, identity management
    
IBM

10 Common Misconceptions Businesses Have About Identity Proofing

Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology, authentication
    
IDology

Protection Starts with Security Management Solutions from Novell

Published By: NetIQ     Published Date: Aug 05, 2011
In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.
Tags : 
novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management, data security, access control, application security, authentication, business continuity, email security, encryption, intrusion detection, intrusion prevention, security policies, virtualization, infrastructure
    
NetIQ

Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective

Published By: Rackspace     Published Date: Mar 08, 2016
Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective
Tags : 
organization, identity solutions, cloud management, access management, best practices, cloud computing, content management
    
Rackspace

Blockchain benefits for electronics

Published By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : 
ibm, blockchain, electronics
    
IBM

IAM Buyers Guide: Select the Right Solution for Identity and Access Assurance

Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management, data management
    
IBM

Protect your critical assets with identity governance

Published By: IBM     Published Date: Jan 15, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, identity governance, security, protection, enterprise applications, business technology
    
IBM

Protect your critical assets with identity governance

Published By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, data security, risk management, data management, identity governance, security, knowledge management, enterprise applications, network security
    
IBM

PAM Interactive Whitepaper

Published By: Group M_IBM Q4'19     Published Date: Oct 28, 2019
Privileged access management (PAM) is the top cybersecurity project for chief information security officers. Managing and protecting privileged accounts is critical. Check out the latest interactive whitepaper for a detailed analysis of PAM, endpoint privilege management, application control and integrations with identity governance. Get scalable, enterprise-grade security solutions, backed by unmatched service and support from IBM Security.
Tags : 
    
Group M_IBM Q4'19

IBM Security: Combat the Latest Security Attacks with Global Threat Intelligence

Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM

Levvel - Guide to Procure-to-pay & Digital Transformation

Published By: Esker     Published Date: Jul 09, 2019
Digital transformation of P2P processes doesn’t just mean using the latest technology to check boxes or implementing automation for automation’s sake. Rather, it is a philosophy that drives action and brings new levels of speed and efficiency to businesses that choose to embrace it.This 2019 Levvel Research report is equipped with valuable insights and powerful statistics about the digital transformation of P2P cycles and will guide you through topics including: Current P2P practices & where they fall short The evolving state of procurement and AP culture, identity & technology Features & benefits of P2P software solutions
Tags : 
    
Esker

Stories of Business Transformation Powered by AirWatch

Published By: VMware AirWatch     Published Date: May 18, 2016
VMware AirWatch gives enterprises identity, productivity and collaboration solutions through enterprise mobility management. The VMware AirWatch platform gives end users a seamless digital workspace, so they can be more effective on the go. A future-proof mobility platform enables IT to support business initiatives now and in the future with features: • Broadest OS and device support with same-day updates • Unified identity management framework across solutions • Suite of integrated productivity and collaboration apps • Centralized content management and collaboration • Global scalability with multi-tenant framework AirWatch offers a unique vision for identity, mobile, network and Infrastructure that is trusted by more than 16,000+ organizations, including 500 of the Global 2000, and has been positioned as a leader by Gartner in the 2015 Magic Quadrant for Enterprise
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management, collaboration, contact management, content delivery, content integration, content management system
    
VMware AirWatch

An Analysis of the IAM Landscape

Published By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : 
centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security, saas, saas security, network security, access control, windows, cloud computing
    
Centrify

The Mobility Quandary: Balancing Mobile Workforce Productivity with Security

Published By: VMware AirWatch     Published Date: Mar 02, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware AirWatch

How A10 Networks' Smart IDentity Management Solutions Simplify Sarbanes-Oxley Act Compliance

Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10, a10 networks, sox compliance, it management, software compliance, sarbanes oxley compliance
    
A10 Networks

SIEM and IAM Solutions: A10 Networks Solves Complexities

Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks

Methodology for Identity Management Projects

Published By: IDFocus     Published Date: Aug 21, 2009
This whitepaper describes our unique approach and methodology for delivering an enterprise-wide Identity and Access Management solution. Our methodology, IDMology, offers pre-defined solutions to repeatable problems occurring during the lifecycle of an Identity Management project.
Tags : 
identity management, access management, iam, identity and access maangement, idmology, idfocus, project management, project lifecycle management, roi, return on investment, security management
    
IDFocus

Password Management vs. Single Sign-On

Published By: IDFocus     Published Date: Aug 21, 2009
In the Identity Management space, there are 3 leading applications: Web access control, single sign-on, and password management. The document also describes two alternative approaches to combining these solutions.
Tags : 
password management, identity management, access management, iam, identity and access management, single sign on, single sign-on, access control, idfocus
    
IDFocus

Tokens Aren't Always the Answer: 4 Cases for Identity-Based Solutions

Published By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : 
network management, network security, access control, nac, network access control, identity management, security management, authentication, smart card, token, trusted network tech, security, security policies, single sign on
    
Trusted Network Tech

NAC NAC: Who’s Really There? (And What Are They Bringing Inside)

Published By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : 
access control, nac, network, identity management, network access control, security, internet security, trusted network tech, local area networking, network security
    
Trusted Network Tech

LAN Security: Identity-Based Solution Guide

Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects, local area networking, identity management, policy based management, security management
    
Nevis Networks

Office 365 Adoption eGuide: Identity and Mobility Challenges

Published By: Okta     Published Date: Jun 15, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
office 365, identity and mobility management, deployment, user adoption, adoption guide, it management
    
Okta

Office 365 Adoption eGuide: Identity and Mobility Challenges

Published By: Okta     Published Date: Jul 01, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
    
Okta

Security and Compliance in the Cloud

Published By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : 
security and compliance in the cloud, business technology
    
NETIQ

CIO's Guide to Azure Active Directory

Published By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
    
Microsoft
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.