Identity Management White Papers

Identity Management (IdM) has developed several interpretations in the IT industry and is now associated as the management of a user's credentials and how they might log onto an online system. The focus on identity management goes back to the development of directories such as X.500 where a namespace is used to hold named objects that represent real life "identified" entities such as countries, organizations, applications, subscribers and devices.
Results 1 - 25 of 333Sort Results By: Published Date | Title | Company Name
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: Nuance Communications     Published Date: Mar 16, 2010

The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control
    
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009

Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.

Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009

Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.

Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
By: Nuance Communications     Published Date: Jun 17, 2009

The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016

This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.

Tags : vasco, identitiy management, portal security, patient security, password protection, cybersecurity, network security, authentication
    
By: Centrify     Published Date: May 26, 2016

Many organizations are turning to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper examines best practices for deploying MFA

Tags : authentication, multi-factor authentication, threat protection, cyber attacks, hacker detection, identity management, security management
    
By: MobileIron     Published Date: May 23, 2016

Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.

Tags : security, mobile device, windows, best practices, streaming, device management, identity management, security management
    
By: MobileIron     Published Date: May 23, 2016

Managing your devices keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron makes your life much simpler and streamlines many traditional PC management responsibilities. 415

Tags : security, mobileiron, best practices, windows, device management, identity management, security management, mobile computing
    
By: Forcepoint     Published Date: May 16, 2016

Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, anti spam
    
By: Forcepoint     Published Date: Apr 20, 2016

Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.

Tags : risk, security, security programme, security, security application, anti spam, anti spyware, anti virus
    
By: Janrain     Published Date: Apr 12, 2016

Now more than ever, customer loyalty and business revenue rely on hyper-personalized engagement. To resolve these issues and remain focused on their core responsibilities, IT professionals are turning to Customer Identity and Access Management (CIAM) platforms.

Tags : janrain, customer identity, access management, ciam, customer service, records management, remote access, identity management
    
By: Logrhythm     Published Date: Feb 24, 2016

The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.

Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control
    
By: Logrhythm     Published Date: Feb 24, 2016

This guide focuses solely on SIEM solutions that are available as appliances that include both the hardware and software needed to deploy them.

Tags : security, application security, siem, siem solutions, identity management, internet security, security management, security policies
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.

Tags : citrix, cyberthreat defense, report, 2015, network security, anti virus, compliance, identity management
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.

Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.

Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper helps organizations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.

Tags : security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper helps organisations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.

Tags : security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust
    
By: Entrust Datacard     Published Date: Nov 24, 2015

This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.

Tags : entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services, access control, application security
    
By: Entrust Datacard     Published Date: Nov 24, 2015

Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.

Tags : ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates
    
By: Entrust Datacard     Published Date: Nov 24, 2015

This guide explores how EV certificates reduce phishing and man-in-the-middle attacks, bring trust, reduce shopping cart abandonment, protect brand and provide support saving.

Tags : verification, ev certificates, identification, extended validation ssl certificates, security, access control, application security, authentication
    
By: Entrust Datacard     Published Date: Nov 24, 2015

This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.

Tags : entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services, access control, application security
    
By: Entrust Datacard     Published Date: Nov 24, 2015

Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.

Tags : ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates
    
By: Entrust Datacard     Published Date: Nov 24, 2015

This whitepaper reveals how tools available from Entrust offer one of the most cost-effective solutions to these problems.

Tags : entrust solutions, certificates, security, security application, authority, security management, access control, application security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.