iam

Results 76 - 100 of 269Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Oltre il 90% delle aziende ritiene che il GDPR influenzerà le proprie modalità di raccolta, utilizzo ed elaborazione di dati personali. È uno dei cambiamenti più rivoluzionari apportati al panorama della privacy digitale negli ultimi vent'anni e, nel mese di maggio 2018, il GDPR dell'Unione europea introdurrà sanzioni fino a 20 milioni di euro in caso di mancata compliance.
Tags : 
gdpr, general data protection regulation, ca technologies, privacy, compliance, protezione dei dati
    
CA Technologies EMEA
Published By: Applause Israel     Published Date: Jun 19, 2018
APPLAUSE CASE STUDY ACCELLION THE INCREASING IMPORTANCE AND COMPLEXITY OF DIGITAL EXPERIENCES Maintaining a strong digital presence is critical as digital experiences are now the front door for your brand. Websites, mobile apps, and connected devices are all different ways for you to connect with your customers on a deeper level, and foster a stronger relationship of trust and loyalty. While you now have a wide-open avenue to reach customers more effectively, you also need to account for a whole new level of complexity, especially in the mobile space. Millions of people can download the same mobile app and have entirely unique experiences. This is a result of how fragmented the digital world has become. ScientiaMobile counted 45,000 different device profiles on the market today, and estimates that this rate of fragmentation will only increase heading into the future. On top of this variability is the wide range on contexts in which your customers can be relying on your mobile app to wo
Tags : 
    
Applause Israel
Published By: Infor     Published Date: Jun 13, 2017
"Customizzazione" è una parola controversa per molti professionisti IT del settore manifatturiero. Il termine "preconfezionato" inoltre offre accezioni contrastanti, dato che spesso viene associato con soluzioni aziendali generiche e antiquate che offrono una funzionalità rudimentale che richiamano la semplicità del "plug and play".
Tags : 
    
Infor
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation, is a piece of legislation that was approved and put in to place by the European Parliament in April 2016. As European Law, it will fully take effect after a 2-year transition ending May 25th 2018. GDPR, replaces the previous Data Protection Directive (DPD), adopted in 1995, and will in the UK, replace and strengthen the Data Protection Act 1998 (DPA). One of the initial differences between GDPR and DPD, is that GDPR is a regulation not a directive; as a regulation, no additional enabling legislation will have to be passed by governments of member states. Redstor have the ability to give insight into the data organisations have on their networks, advise on best practice to protect data and then implement strategies around backup, archiving and disaster recovery. Data is searchable through an intuitive console making compliance simple and achievable for all organisations protecting data through the Backup Pro Platform.
Tags : 
    
Redstor UK
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction, in-house directories, management challenges, cloud-based services, b2b, b2c, cloud services, it applications, source of identity, bring your own identity, iam-as-a-service, security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
    
Wisegate
Published By: MediaMath     Published Date: Feb 27, 2015
Download “The CMO Solution Guide to Programmatic Marketing” Now From the RFP, to onboarding, to managing campaigns – what does the CMO need to know to drive success with programmatic? Nearly 70% of marketers surveyed in a recent CMO Club poll weren’t sure about the technologies used to execute their digital marketing campaigns. MediaMath and the CMO Club produced this peer-to-peer guide to bridge the knowledge gap for CMOs and senior marketers.
Tags : 
marketing solutions, programmatic marketing, mediamath, campaign management
    
MediaMath
Published By: MediaMath     Published Date: Feb 27, 2015
A compilation of articles written by MediaMath experts, the leaders in programmatic advertising.
Tags : 
mediamath, ecommerce, marketing solutions, programmatic advertising
    
MediaMath
Published By: MediaMath     Published Date: Feb 27, 2015
“Advancing Practices in Real-Time Marketing,” a July 2014 commissioned study conducted by Forrester Consulting on behalf of MediaMath, examines how marketers across different verticals are taking demonstrable, concrete actions to enable real-time, one-to-one marketing.
Tags : 
real-time marketing, one-to-one marketing, marketing solutions, advanced marketing
    
MediaMath
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. Mimecast’s proven portfolio of cloud-based, security and cyber resilience services for email can be a vital component of any organisation’s Notifiable Data Breaches compliance strategy
Tags : 
    
Mimecast
Published By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, business technology
    
Okta
Published By: Okta     Published Date: Jul 25, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, business technology
    
Okta
Published By: Okta     Published Date: Aug 03, 2016
Within 6 months of purchasing Okta, the average customer connects 10 applications, and once up and running, the number increases quickly. But, the average customer could be using twice as many provisioning integrations than they are. Using Okta for single sign-on and a centralized view of your cloud apps isn’t nearly enough. Watch this webinar for a live demo of Okta’s new Access Request Workflow and Access Discovery Report features and learn how Okta Provisioning can bring sanity to your IT processes. Learn about: • Provisioning Workflows • Role & Rule-based Access Control • Security-focused Compliance Reporting
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, business technology
    
Okta
Published By: Okta     Published Date: Jul 25, 2016
Hear how Okta automates employee onboarding and offboarding through deep integration between Workday, Medallia’s human resources information system, and Active Directory.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, business technology
    
Okta
Published By: Okta     Published Date: Jul 25, 2016
Adobe wanted to enable creativity in their customers and allow them to be mobile and function in the cloud. Recognizing that identify was key to making this work they leveraged Okta to create a simple and secure customer experience. Download this white paper to learn more about how Adobe found a way to bring IT and engineering together and overcome identify concerns.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, business technology
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
IT leaders at FICO, Rotary International, Informatica, and many other leading organizations are becoming strategic business enablers and creating new ways to engage customers and partners with Okta. Watch this short video to learn how these IT leaders are driving business results with Okta.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
IT leaders are finding new opportunities in an era of digital disruption. Read this two page executive brief for a quick overview of how IT is driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers, distributors, and devices.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
Most IT decision makers are struggling to master identity management in an infrastructure where modern cloud-based software must function with legacy on premise systems. According to a recent IDG Research study, 91 percent of respondents say solving this identity management conundrum is critical or very important to succeeding at their digital initiatives. And the vast majority of respondents long for a solution that is both efficient to manage and provides users and customers with an outstanding experience. This white paper examines how your peers are looking at digitizing their businesses, lowering the total cost of ownership, and building an identity management strategy to support their business’s goals.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.