> Home > Technology > Security > Identity Management

Identity Management

Identity Management (IdM) has developed several interpretations in the IT industry and is now associated as the management of a user's credentials and how they might log onto an online system. The focus on identity management goes back to the development of directories such as X.500 where a namespace is used to hold named objects that represent real life "identified" entities such as countries, organizations, applications, subscribers and devices.
Results 26 - 50 of 333Sort Results By: Published Date | Title | Company Name
White Paper Published By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : 
security, internet security, privacy, digital security certificates, security keys
    
Venafi
White Paper Published By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : 
security, internet security, privacy, digital security certificates, security keys
    
Venafi
White Paper Published By: Centrify     Published Date: Sep 08, 2015
Adding Macs to a Microsoft-based corporate network can be a challenge. This paper will explore how Centrify can quickly and easily provide the necessary tools to allow Macs to be managed in the same way PCs are managed today.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
White Paper Published By: TigerText     Published Date: Aug 30, 2015
Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.
Tags : 
tigertext, tiger text, byod, hippa compliance, patient data
    
TigerText
White Paper Published By: Adobe     Published Date: Aug 04, 2015
This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.
Tags : 
esign, e-signatures, online signatures, digital signatures for sales, sales
    
Adobe
White Paper Published By: Adobe     Published Date: Aug 04, 2015
Learn how e-signatures remove the last barrier between a hybrid paper to digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract.
Tags : 
electronic signatures, digital signatures, paper to digital, business intelligence, database
    
Adobe
White Paper Published By: Adobe     Published Date: Aug 04, 2015
This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.
Tags : 
e-signatures, digital signatures, electronic signatures, e-signatures solution, e-signatures and procurement
    
Adobe
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect prominent securities.
Tags : 
firewall, intrusion detection, intrusion prevention, ips, ids
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox
    
Vectra Networks
White Paper Published By: IBM     Published Date: Jul 31, 2015
Governance solutions.
Tags : 
identity, protection, critical, solution, compliance
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
New endpoint solution.
Tags : 
hacker detection, identity management, intrusion detection
    
IBM
Case Study Published By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : 
cybersecurity, keys, certificates, cyber attacks, server certificate misuse
    
Venafi
White Paper Published By: Entrust Datacard     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : 
internet of things, authentication, security, identity, safety
    
Entrust Datacard
White Paper Published By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : 
database vulnerability, proactive strategies, data protection, compliance, data breach
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : 
big data security, data privacy, data protection, sensitive data, data risk management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
How to create proactive big data security and privacy strategies
Tags : 
data security, compliance, data protection, data privacy, safeguarding information
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : 
data protection, mobility, endpoint management, governance policies, consumerization
    
IBM
White Paper Published By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : 
dlp, data loss, security, best practices, access control
    
CDW
White Paper Published By: IBM     Published Date: Jun 16, 2015
Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.
Tags : 
enterprise, cloud computing, data centers, cloud-based solutions, it solutions
    
IBM
Case Study Published By: Acronis EMEA     Published Date: May 19, 2015
The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.
Tags : 
mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity
    
Acronis EMEA
White Paper Published By: Acronis EMEA     Published Date: May 18, 2015
Download this datasheet to discover the main benefits of Acronis Access Advanced.
Tags : 
acronis, acronis access advanced, secure mobile access, security, content security
    
Acronis EMEA
White Paper Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp
    
Kaseya
White Paper Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification
    
IBM
White Paper Published By: Internap     Published Date: Mar 30, 2015
How do you determine the right colocation provider for your business? Colocation can offer many cost-efficient benefits, including scalability, improved business continuity, security and compliance.
Tags : 
business continuity, security, scalability, data center, connectivity
    
Internap
White Paper Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Home