identity management

Results 1 - 25 of 298Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Adopting Identity as a Service (IDaaS), also known as Cloud IAM, can reduce your IT costs, but how do you convince your organization to take the leap? Use this TCO guide to compare the cost of on-premises and cloud-based IAM, such as IBM Cloud Identity Service. Then, calculate your three-year cost savings to truly “wow” your team.
Tags : 
iam, total cost of ownership, cloud based identity, access management, idaas
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : 
idaas, cloud based identity, access management, iam, identity governance functionality
    
IBM
Published By: VMware     Published Date: Feb 24, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware
Published By: FICO     Published Date: Aug 27, 2012
This white paper provides a step-by-step guide to ensuring success with your business rules management project. You'll learn the components of a successful business rules management project.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, knowledge management, business technology
    
FICO
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
CA Technologies
Published By: Okta     Published Date: Mar 10, 2016
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: Okta     Published Date: Mar 10, 2016
LinkedIn sees cost and time benefits from Okta’s on-demand identity and access management service; securely integrating their cloud applications with Active Directory, single sign-on, and provisioning reports.
Tags : 
    
Okta
Published By: Okta     Published Date: Mar 10, 2016
To manage and control how the airport's employees make use of these cloud-computing services, Gatwick has turned to the cloud-based identity management service from Okta, which lets the security manager centrally manage, provision and de-provision single sign-on access to cloud services for Gatwick's staff.
Tags : 
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity-as-a-service, authentication, authorization, open web, iam, saml, oauth, openid, scim, spml, xacml
    
NetIQ
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.
Tags : 
technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
With the arrival of Dell 12th generation servers (12G) and Microsoft Windows Server 2012, your organization can now significantly simplify Windows Server deployment. Window Server 2012 delivers a number of new enhancements and features over your current Windows Server 2003 or Windows Server 2008 infrastructure. With Windows Server 2012, your organization can benefit from improved virtualization, identity and access control management, graphical interface, storage and networking, and Web and application hosting. Dell 12G servers provide a powerful platform for Windows Server 2012 and its advanced features, giving your organization better performance, reliability and management, all of which improve return on investment (ROI) and your bottom line. For more information on powering Dell servers with Windows Server 2012, see www.dell.com/ws2012.
Tags : 
dell poweredge, 12g servers, windows servers, performance, reliability, control management, graphical interface, storage, networking, web hosting, application hosting
    
Dell & Microsoft
Published By: IBM     Published Date: Jan 09, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. This paper provides four key steps that can move you toward a more mature solution now.
Tags : 
ibm, security, services operations, iam programs, enterprise applications, business technology
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com