iam

Results 251 - 269 of 269Sort Results By: Published Date | Title | Company Name
Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication
    
Deep Software
Published By: Entrust Datacard     Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
Tags : 
entrust identityguard, versatile authentication platform, entrust, authentication, password management, identity management, iam, internet security
    
Entrust Datacard
Published By: BMC ESM     Published Date: Jul 17, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization
    
BMC ESM
Published By: Okta     Published Date: Apr 29, 2015
Authenticating users on a variety of endpoints should provide the right balance of user experience, security and workforce productivity. CISOs and IAM leaders need to keep pace with new methods of remote access for the mobile workforce in a constantly changing work environment. Read this report why.
Tags : 
workforce, ciso, iam, mobile, workforce, security, it management
    
Okta
Published By: Hitachi ID Systems     Published Date: Dec 20, 2010
IAM in the Cloud: an overview of technology and value
Tags : 
identity management, cloud computing, iam, security
    
Hitachi ID Systems
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NETIQ
Published By: Oracle     Published Date: Feb 15, 2018
All’inizio, probabilmente avrai scelto di adottare l’infrastruttura cloud con una certa prudenza, limitandoti a un approvvigionamento rapido o alla riduzione dei costi operativi o delle macchine. Ma come resistere ai vantaggi di questo nuovo modo di fruire della tecnologia? Il cloud continua a evolvere e a conquistare credibilità in tutti i settori. Oggi, ci aspettiamo che ogni sistema aziendale possa beneficiare dei vantaggi del cloud.
Tags : 
iaas, all'inizio, l'infrastructtura, cloud, oracle
    
Oracle
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : 
ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap
    
JumpCloud
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : 
ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap
    
JumpCloud
Published By: CA Technologies     Published Date: Jun 04, 2015
Muito se fala sobre DevOps, uma metodologia que reúne função antes distintas de desenvolvimento de software (Dev), de produção e operações (Ops) em um processo comum, integrado e contínuo. DevOps quebra as barreiras entre o desenvolvimento, a produção e as operações. Utiliza pessoas, processos e tecnologia para estimular a colaboração e a inovação nos processos de desenvolvimento e liberação de software. O o desenvolvimento, a produção e as operações deveriam sempre fazer parte de um processo integrado, mas isso nem sempre é tão fácil como parece. Você pode se perder no que chamamos de “Dysfunction Junction”. Leia este eBooklet e conheça os obstáculos de DevOps, como evitá-los e os primeiros passos para chegar lá.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Jan 07, 2016
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations.
Tags : 
ibm, identity, access assurance, identity, security
    
IBM
Published By: Okta     Published Date: Nov 03, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits, networking
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: IBM     Published Date: Oct 26, 2017
When choosing among providers of identity and access management as a service (IDaaS), a great place to start is evaluating your own organization’s IAM needs. Create a personalized list of your identity and access management (IAM) needs and determine if IBM® Cloud Identity Service is right for you. With this checklist, you will be able to determine if your needs match up with the benefits of IBM Cloud Identity Service.
Tags : 
iam, idaas, web access management, cloud based security, governance administration, enterprise grade identity
    
IBM
Published By: Workday Spain     Published Date: Sep 20, 2018
Per due anni consecutivi, Gartner, società di ricerca indipendente, ha riconosciuto Workday tra i leader per le soluzioni cloud di gestione del capitale umano (HCM) su 11 fornitori esaminati. Registrati per scaricare il report ""Gartner Magic Quadrant for Cloud HCM Suites for Midmarket and Large Enterprises"" (offerto da Workday) e scopri perché per il secondo anno consecutivo abbiamo conquistato la prima posizione nel quadrante dei leader per capacità di attuazione.
Tags : 
    
Workday Spain
Start   Previous    1 2 3 4 5 6 7 8 9 10 11     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.