Identity Management White Papers

Identity Management (IdM) has developed several interpretations in the IT industry and is now associated as the management of a user's credentials and how they might log onto an online system. The focus on identity management goes back to the development of directories such as X.500 where a namespace is used to hold named objects that represent real life "identified" entities such as countries, organizations, applications, subscribers and devices.
Results 1 - 25 of 279Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Sep 30, 2014

Measure your content marketing effectiveness and value by following these five steps, brought to you by the Oracle Marketing Cloud.

Tags : personalize, engagement, advocacy, revenue, marketing, cloud, oracle, identity management
    
By: Cisco     Published Date: Jan 21, 2015

Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.

Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
By: CA Technologies     Published Date: Jan 09, 2015

This White Paper provides information on how enhance delivery secure and improve customer experience.

Tags : security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions, access control, anti spam, application security
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.

Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security, access control, application security, business continuity, identity management
    
By: CA Technologies     Published Date: Jan 09, 2015

This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.

Tags : identity-based security, business protection, identity, security solutions, new trends to secure business, access control, application security, authentication
    
By: CA Technologies     Published Date: Jan 09, 2015

This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.

Tags : byod, identity, byoid benefits, access control, application security, authentication, identity management, intrusion prevention
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 19, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: CA Technologies     Published Date: Nov 07, 2014

Une solution IAM hybride permet aux organisations de migrer vers le Cloud au rythme qui correspond à leurs exigences de réduction des coûts opérationnels et d’améliorer leur agilité.

Tags : ca technologies, migrer vers le cloud, cloud computing, iam hybride permet, identity management, mobile computing, infrastructure
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: CA Technologies     Published Date: Oct 22, 2014

This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, identity management, network security appliance
    
By: IBM     Published Date: Aug 08, 2014

Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.

Tags : security, mobile risk mitigation, mobile baking, detect fraud, application security, hacker detection, identity management, intrusion detection
    
By: Acxiom Corporation     Published Date: Jun 20, 2014

Consumers demand – no, expect – marketers to deliver highly relevant communications. Yet, daily headlines about security and privacy keep them on guard about use of their personal information. How do you reconcile the personalization privacy paradox? Guest speaker, Forrester Research, Inc.’s Fatemeh Khatibloo and Bryan Throckmorton of Acxiom will offer fresh findings on customer expectations regarding privacy and examples of how companies are building transparency and trust – and differentiating themselves – with preference centers that put more control in the hands of customers.

Tags : acxiom, forrester research, privacy, personalization, personal information, marketing, personalization privacy, identity management
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: Absolute Software     Published Date: May 14, 2014

Three simple steps to legally secure and manage employee-owned devices within a corporate environment

Tags : byod, workforce mobility, enpoint protection, mobile devices, absolute software, access control, application security, identity management
    
By: Absolute Software     Published Date: May 14, 2014

Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.

Tags : endpoint protection stategy, byod, workforce mobility, absolute software, own device, access control, application security, email security
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.