identity and access management iam

Results 26 - 50 of 56Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. This paper provides four key steps that can move you toward a more mature solution now.
Tags : 
ibm, security, services operations, iam programs
    
IBM
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. They are at the core of achieving critical business objectives that are relevant to every high-performing organization. As a result, there are few IT or security initiatives that demand as much deliberation and scrutiny.
Tags : 
identity management, access management, it environments, data security, business performance
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : 
idaas, cloud based identity, access management, iam, identity governance functionality
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
When choosing among providers of identity and access management as a service (IDaaS), a great place to start is evaluating your own organization’s IAM needs. Create a personalized list of your identity and access management (IAM) needs and determine if IBM® Cloud Identity Service is right for you. With this checklist, you will be able to determine if your needs match up with the benefits of IBM Cloud Identity Service.
Tags : 
iam, idaas, web access management, cloud based security, governance administration, enterprise grade identity
    
IBM
Published By: IBM     Published Date: Apr 23, 2018
IBM Cloud Identity Service is helping businesses simplify Identity and Access Management (IAM) through a cloud-delivered service (IDaaS). IBM Cloud Identity Service combines the full spectrum of IAM, including federation, web access management, and identity governance with the speed, agility, and lower cost of the cloud. This video demonstrates how to rapidly integrate SaaS and other third-party applications using the "Quick Connect" feature within the IBM Cloud Identity Service and securely connect people and applications to the cloud.
Tags : 
idaas, ibm cloud identity service
    
IBM
Published By: Janrain     Published Date: Apr 12, 2016
Now more than ever, customer loyalty and business revenue rely on hyper-personalized engagement. To resolve these issues and remain focused on their core responsibilities, IT professionals are turning to Customer Identity and Access Management (CIAM) platforms.
Tags : 
janrain, customer identity, access management, ciam, customer service, records management
    
Janrain
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa
    
NetIQ
Published By: Okta     Published Date: Oct 12, 2010
This white paper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
okta, identity and access management, saas applications, iam, password fatigue, compliance, application integration, identity management
    
Okta
Published By: Okta     Published Date: Jan 30, 2013
This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
top 8, access management, challenges, saas applications, okta
    
Okta
Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation
    
Okta
Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility
    
Okta
Published By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity and access management, saas applications, single sign-on, active directory, management solutions
    
Okta
Published By: Okta     Published Date: Apr 29, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn why.
Tags : 
identity, iam, management, mobile
    
Okta
Published By: Okta     Published Date: Nov 03, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits
    
Okta
Published By: Okta     Published Date: Nov 09, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn more.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Mar 03, 2017
Host Jon Collins from The Register will be quizzing Tony Lock from Freeform Dynamics and Nadav Benbarak, from Okta, to understand just how far things have come and, most importantly, what to do about them.
Tags : 
    
Okta
Published By: OKTA     Published Date: Apr 24, 2018
"It’s important to understand the role that an Identity platform plays in modern enterprise IT. In the past, Identity and Access Management systems were an afterthought. They were put into place after making many of your other architectural decisions. With the move to web, cloud and mobile, IAM has become a key variable in hardware and software deployment, as well as in operational strategy. This webinar will reveal why leveraging an IAM platform, built as a single cloud-based platform for security across on-prem and cloud, can solve these issues."
Tags : 
    
OKTA
Published By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
    
OKTA
Published By: OneLogin     Published Date: Oct 24, 2017
For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. S&R pros must now govern access across a variety of populations — from employees to partners to customers — without affecting experience. And they must protect corporate resources across a hybrid environment while providing users secure access to these resources from a variety of devices. This report describes the trends shaping the IAM landscape in 2017 and how S&R pros should adapt.
Tags : 
    
OneLogin
Published By: Ping Identity     Published Date: Jan 29, 2013
Corporate security compliance requirements are driving new demands/requirements for identity and access management (IAM). Learn how you can extend your enterprise beyond the perimeter with stronger security, less risk and higher efficiency.
Tags : 
access management, age of cloud computing, cloud, ping, iam, enterprise security
    
Ping Identity
Published By: Ping Identity     Published Date: Feb 12, 2016
Most organizations today are scrutinizing technology budgets more and more. It helps to see technology investments in terms of total economic impact (TEI). Forrester Research quantified the benefits of implementing Identity and Access Management (IAM), and one of the top reasons supporting IAM was to eliminate the need for repeated user sign-ons, which increases user satisfaction. In measuring the TEI of one large organization’s IAM investment, Forrester uncovered several areas where SSO had a direct impact on improving the customer experience and driving revenue.
Tags : 
    
Ping Identity
Start   Previous    1 2 3    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.