mobile identity

Results 26 - 50 of 70Sort Results By: Published Date | Title | Company Name

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: Jul 27, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta

New Whitepaper: Identity & Access Management for Mobile Is Here

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : 
mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
    
Good Technology Corporation

Make Your App Stand Out From The Crowd

Published By: Monotype     Published Date: Sep 09, 2015
The mobile app marketplace is exploding, and this means your mobile app will face tough competition in the fight for attention and user adoption. One powerful way to attract new users, generate positive reviews and establish your brand identity is with the typefaces you select.
Tags : 
monotype, mobile apps marketplace, brand identity, global markets, typography
    
Monotype

The New Enterprise Security Model: Prevent, Detect, Respond

Published By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
    
Okta

VMware Workspace ONE and Microsoft Office 365: Enabling more Secure Collaboration

Published By: VMware     Published Date: May 10, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. Download this whitepaper to discover how VMware Workspace ONE™ brings together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware

Mobility Quandary: Balancing Mobile Workforce Productivity with Security

Published By: VMware     Published Date: May 10, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware

Creating The Workspace of the Future – Today

Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware

VMware jumps back into IDaaS Pool with VMware Identity Manager (May 2016)

Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provision¬ing and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMware’s strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMware’s re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware

SAML as an SSO

Published By: Gigya     Published Date: Jun 08, 2015
The rise of eCommerce, social networks, mobile and connected devices has surfaced SAML as a key solution to develop a customer identity access management (cIAM) strategy to keep up with the flood of cross-channel consumer data.
Tags : 
ecommerce, social networks, mobile devices, customer identity access management, cross-channel consumer data, it management
    
Gigya

The Three C’s of Good Visual Identity

Published By: Monotype     Published Date: Jan 10, 2017
Without overstating the situation, it's safe to say there has been a seismic shift in the way brands and customers interact, and with it, an equally profound change in how brands must communicate, market, and relate to their customers. In this eBook, you’ll learn about three areas of particular importance—continuity, customers, and compliance—where type can help deliver on the experience today's consumers expect.
Tags : 
digital design, monotype, design, creative, web fonts, internet marketing, branding, user experience, marketing best practices, marketing, emerging marketing, mobile ads, brand identity, brand health, consistency, continuity, customers, compliance, fonts, branding best practices
    
Monotype

Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam, identity management, password management, security management, cloud computing
    
F5 Networks Inc

Enterprise Authentication: Securing Identities in an Evolving Environment

Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard

Securing Identities for Enterprise Users, Devices & Applications

Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard

Why Mobile is the Next Digital Identity

Published By: Entrust Datacard     Published Date: Jul 21, 2014
How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces?
Tags : 
mobile, digital identity, platform, geographies, verticals, cultures, secure, desktop pc, security, data management
    
Entrust Datacard

5 Best Practices for Defending the Enterprise

Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard

4 Powerful Levers from Lenovo and Forrester to Implement Zero Trust

Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel

MobilePass - Authenticating Users on the Go!

Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, wireless phones
    
Secure Computing

Securing Mobile Connectivity with Two-Factor Authentication

Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access, wireless phones, productivity
    
Secure Computing

Best Practices for Authenticating Mobile Workers and Securing Data Access

Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing

Five Ways to Improve Your Wireless Security

Published By: Cisco     Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
Tags : 
cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy, password policy, cisco asa 5500, secure vpn, networking, security, local area networking, vpn, wide area networks, anti virus, identity management, security management
    
Cisco

AirWatch prend en charge

Published By: VMware AirWatch     Published Date: Nov 12, 2015
L’une des questions que de nombreux clients se posent récemment est « Comment Office 365 est-il pris en charge par AirWatch ? » Beaucoup se demandent si AirWatch peut contrôler l’accès à Office 365 (O365) non seulement sur leurs systèmes de Bureau d’entreprise mais surtout sur leurs terminaux mobiles. AirWatch® by VMware® apporte un soutien complet aux organisations qui souhaitent utiliser O365 sur leurs terminaux mobiles. Notre récente intégration à VMware® Identity Manager fournit un cadre de contrôle d’accès adaptatif pour s’assurer que toutes les applications professionnelles, dont O365, sont uniquement consultées depuis des terminaux gérés et conformes.
Tags : 
airwatch, emm, office365, cloud, software development, it management, wireless, knowledge management, platforms, data management
    
VMware AirWatch

Top 5 Reasons to Automate Identity Lifecycle

Published By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
    
OKTA

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.