identity governance

Results 1 - 25 of 50Sort Results By: Published Date | Title | Company Name
Published By: SailPoint Technologies     Published Date: Aug 02, 2019
Find out how cloud identity governance cost-effectively reduces security and compliance risk, while also providing timely access to information. Download the brief.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Find out how combining identity governance with privileged account management significantly decreases security risks and improves productivity. Download the brief.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Short Description (1000 characters max) Want the strongest cybersecurity possible? Download this brief to find out how Identity governance, combined with privileged access management, will give you the information you need to quickly identify and respond to security risks.
Tags : 
    
SailPoint Technologies
Published By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
    
SailPoint
Published By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
    
SailPoint
Published By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
    
SailPoint
Published By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, enterprise applications
    
NetIQ
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : 
mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders, in-house deployments, cost of ownership, external interaction, identifiable data, security services, access management, identity governance, drivers and blockers, data management, data center
    
CA Technologies
Published By: SailPoint     Published Date: Feb 08, 2011
This guide is designed to help ensure a successful identity governance strategy can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Tags : 
sailpoint, identity governance, compliance, risk management, access management, password management, reporting and analytics
    
SailPoint
Published By: Okta     Published Date: Jul 25, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable.
Tags : 
okta, best practices, technology, optimization, identity governance, cloud computing, business technology
    
Okta
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper to learn how you can meet the growing needs of both your Identity Management systems and Access Governance systems by bringing business and IT together.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management, business technology
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
iag, identity management, access governance, it security, business technology
    
NetIQ
Published By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : 
identity governance, iam, identity management, user-centric security
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Test your knowledge. Read the top 5 myths about identity governance and discover if what you believe is actually true or false.
Tags : 
identity governance, iam, identity management, provisioning, role management, cloud identity
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Read this white paper to learn how enterprise security has become user-centric and why identity governance is the key to preventing data breaches.
Tags : 
identity governance, iam, identity management
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Mar 25, 2019
Digital transformation requires news ways to ensure cybersecurity and compliance. Find out why top senior technology executives call identity governance the great enabler.
Tags : 
cyberattacks, cybersecurity
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Apr 10, 2019
Todayís businesses are more interconnected and vulnerable to security threats. Read the top 6 reasons why identity governance can help protect organizations of any size stay protected.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones ó CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt ó and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Aug 02, 2019
Donít risk severe financial penalties from CCPA non-complance. Download this brief to find out how to protect your customer data with SailPoint identity governance.
Tags : 
    
SailPoint Technologies
Published By: NETIQ     Published Date: Jan 12, 2017
Todayís attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
Our analysis of the survey findings indicates that as enterprise organizations attempt to respond to the need to provide more access to more information online, the ability to govern that access is being strained to a breaking point.
Tags : 
    
NETIQ
Published By: Microsoft Azure     Published Date: Apr 11, 2018
While itís clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. Youíll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
    
Microsoft Azure
Previous   1 2    Next    
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com