Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

identity and access management

Results 101 - 125 of 147Sort Results By: Published Date | Title | Company Name
Published By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services, security, enterprise applications
    
ForgeRock
Published By: ForgeRock     Published Date: Oct 08, 2014
Customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before. Forrester finds that to achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity. Fortunately, a new consumer-facing solution is gaining currency and has earned a name unto itself: Identity Relationship Management.
Tags : 
customer focused, content, access management, consumer-facing solution, iam platform, enterprise applications
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).
Tags : 
iam, irm, forrester, forgerock, platforms, relationship management, software development
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
iam, forgerock, irm, relationship management, software development
    
ForgeRock
Published By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : 
cloud environment, iaas, paas, saas, access management, security, it management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance, networking, security, it management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, security, it management
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : 
ibm, continuous compliance, reduced risk, security, threat intelligence, iam
    
IBM
Published By: IBM     Published Date: Jul 31, 2018
Simplify and secure identity and access management with IBM Cloud Identity for single sign-on, seamless access and improved efficiency.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q4'19     Published Date: Oct 28, 2019
Identity and access management (IAM) can be hard to explain and even harder to understand. What is IAM and why is it so important? IT jargon aside, check out the latest interactive whitepaper for a helpful and easy to use metaphor for understanding IAM. Treat your organization like an airport; give the right people access to the right resources in a seamless and secure way with IBM Security.
Tags : 
    
Group M_IBM Q4'19
Published By: Ping Identity     Published Date: Jan 29, 2013
Corporate security compliance requirements are driving new demands/requirements for identity and access management (IAM). Learn how you can extend your enterprise beyond the perimeter with stronger security, less risk and higher efficiency.
Tags : 
access management, age of cloud computing, cloud, ping, iam, enterprise security, security, data center
    
Ping Identity
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : 
idaas, cloud based identity, access management, iam, identity governance functionality
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
For financial institutions, IBM access management solutions can ease regulatory compliance and provide user-centric authentication options.
Tags : 
compliance-proof, access management, user-centric authentication, regulatory compliance
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Apr 23, 2018
To assist IAM leaders with their IDaaS vendor selection process, Gartner evaluated 18 vendors' services in this research using 11 critical capabilities and three common use cases: workforce to SaaS, business-to-consumer and traditional/legacy workforce.
Tags : 
idaas, ibm cloud identity service
    
IBM
Published By: IBM     Published Date: Apr 23, 2018
IBM Cloud Identity Service is helping businesses simplify Identity and Access Management (IAM) through a cloud-delivered service (IDaaS). IBM Cloud Identity Service combines the full spectrum of IAM, including federation, web access management, and identity governance with the speed, agility, and lower cost of the cloud. This video demonstrates how to rapidly integrate SaaS and other third-party applications using the "Quick Connect" feature within the IBM Cloud Identity Service and securely connect people and applications to the cloud.
Tags : 
idaas, ibm cloud identity service
    
IBM
Published By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
Published By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : 
centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security, saas, saas security, network security, cloud computing
    
Centrify
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, wireless, enterprise applications
    
Bitium
Published By: VMware AirWatch     Published Date: Mar 02, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware AirWatch
Published By: Janrain     Published Date: Apr 12, 2016
Now more than ever, customer loyalty and business revenue rely on hyper-personalized engagement. To resolve these issues and remain focused on their core responsibilities, IT professionals are turning to Customer Identity and Access Management (CIAM) platforms.
Tags : 
janrain, customer identity, access management, ciam, customer service, records management, remote access
    
Janrain
Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.