identity

Results 201 - 225 of 707Sort Results By: Published Date | Title | Company Name
Published By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : 
security, endpoint security, access control, authentication
    
Centrify
Published By: MessageLabs     Published Date: May 28, 2008
Whether its spyware hidden amidst a seemingly innocuous download, a “spoofed” social networking identity, or phishing emails that gain access to valuable information, web and email-based security threats are more advanced and more covert than ever before. Learn how MessageLabs integrated web and email security services protect your business.
Tags : 
    
MessageLabs
Published By: DocuLex     Published Date: Jan 27, 2012
Automotive Dealer solution to affordable protection of customer files from identity theft and legal exposure.
Tags : 
    
DocuLex
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper to learn how you can meet the growing needs of both your Identity Management systems and Access Governance systems by bringing business and IT together.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management, business technology
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
iag, identity management, access governance, it security, business technology
    
NetIQ
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. This guide will help you understand the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, identity theft, security, technology, it protection, identify protection, authentication, fraud
    
LifeLock
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. Call me to learn about the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, security, identity threat, authentication, it security
    
LifeLock
Published By: Splunk     Published Date: Sep 17, 2012
Download this whitepaper to discover how Ping Identity is using Splunk to gain significant hard and soft ROIs.
Tags : 
cloud, cloud computing, cloud scale, cloud identity security, cloud operations, increase roi, security, data management, business technology
    
Splunk
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : 
mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
    
Good Technology Corporation
Published By: NetIQ     Published Date: Nov 05, 2012
An analysis of the annual Gartner survey of CIOs' most urgent priorities identifies the business and technology concerns where identity and access management has business-relevant impacts.
Tags : 
gartner, iam, identity and access management, cio, business priorities, iam initiatives, security, business technology, research
    
NetIQ
Published By: NetIQ     Published Date: Nov 05, 2012
User administration solutions manage identities and their attributes across systems, applications and resources. Buyers seek to demonstrate regulatory compliance while reducing project deployment times and costs.
Tags : 
iam, identity and access management, iam initiatives, security compliance, security, business technology, research
    
NetIQ
Published By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: ForgeRock     Published Date: May 05, 2015
Forrester Consulting ist ein unabhängiges Beratungsunternehmen, das Führungskräfte auf der Basis objektiver Recherchen dabei unterstützt, in ihren jeweiligen Unternehmen Erfolg zu haben. Die Beratungsleistungen von Forrester reichen von kurzen Strategiebesprechungen bis hin zu individuellen Projekten und verbinden den Kunden direkt mit Forschungsanalysten, um speziellen geschäftlichen Herausforderungen mit Experten-Know-how begegnen. Weitere Informationen finden Sie unter forrester.com/consulting.
Tags : 
software development
    
ForgeRock
Published By: ForgeRock     Published Date: Jul 09, 2015
In the great Internet of Things (IoT) gold rush, early adopters have largely left behind identity and access management. As a result, many organizations are scrambling to deal with the consequences. Successful IoT implementations have complex relationships to people, things, and services, and the only sustainable and secure method for securing the IoT long term is to enable persistent identity across applications, devices, and things.
Tags : 
idot, aim, lot, forgerock, applications, access management, architecture, it management
    
ForgeRock
Published By: Monotype     Published Date: Sep 09, 2015
The mobile app marketplace is exploding, and this means your mobile app will face tough competition in the fight for attention and user adoption. One powerful way to attract new users, generate positive reviews and establish your brand identity is with the typefaces you select.
Tags : 
monotype, mobile apps marketplace, brand identity, global markets, typography
    
Monotype
Published By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
Microsoft is making a massive push to the cloud, and as a result Office 365 is taking off. However, Office 365 is unlike any other cloud app in its complexity. Read this eGuide to learn about industry trends and best practices for rolling out Office 365 with maximum user adoption.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Aug 03, 2016
Microsoft is making a massive push to the cloud. As a result Office 365 is taking off. But in its complexity, Office 365 is unlike any other cloud app. Often this causes impactful deployment delays. Instead of relying on legacy tools Microsoft gives away, learn to remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. This webinar will discuss: • The basic identity management requirements for an Office 365 deployment • Microsoft’s existing identity management tools • The role of identity management in building a diverse cloud strategy
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Mar 03, 2017
Host Jon Collins from The Register will be quizzing Tony Lock from Freeform Dynamics and Nadav Benbarak, from Okta, to understand just how far things have come and, most importantly, what to do about them.
Tags : 
    
Okta
Published By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
    
Okta
Published By: Oracle     Published Date: Feb 21, 2018
Oracle debuted its Blockchain Cloud Service in October, and now one of Oracle’s early-stage partners, AuraBlocks, has already created a financial service on the platform. AuraBlocks is using blockchain to help its customer Biz2Credit verify the identity of borrowers. Biz2Credit provides loans to small- and medium-sized businesses.
Tags : 
    
Oracle
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.