iam

Results 126 - 150 of 260Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations.
Tags : 
ibm, identity, access assurance, identity, security
    
IBM
Published By: Hitachi ID Systems     Published Date: Dec 20, 2010
IAM in the Cloud: an overview of technology and value
Tags : 
identity management, cloud computing, iam, security
    
Hitachi ID Systems
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: IBM     Published Date: Apr 23, 2018
IBM Cloud Identity Service is helping businesses simplify Identity and Access Management (IAM) through a cloud-delivered service (IDaaS). IBM Cloud Identity Service combines the full spectrum of IAM, including federation, web access management, and identity governance with the speed, agility, and lower cost of the cloud. This video demonstrates how to rapidly integrate SaaS and other third-party applications using the "Quick Connect" feature within the IBM Cloud Identity Service and securely connect people and applications to the cloud.
Tags : 
idaas, ibm cloud identity service
    
IBM
Published By: Courion     Published Date: Nov 05, 2012
Learn how to identify, quantify and manage access risk by taking a revealing, visually guided tour of the industry's premier access intelligence solution, Access Insight, via actual screenshots from a customer implementation.
Tags : 
courion, intelligence solution, access insight, iam, security risk, security insight, security, data management, business technology, data center
    
Courion
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: Okta     Published Date: Nov 03, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits, networking, security, it management, knowledge management, data management
    
Okta
Published By: Okta     Published Date: Nov 09, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn more.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits, security, knowledge management, data management, business technology
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
Most IT decision makers are struggling to master identity management in an infrastructure where modern cloud-based software must function with legacy on premise systems. According to a recent IDG Research study, 91 percent of respondents say solving this identity management conundrum is critical or very important to succeeding at their digital initiatives. And the vast majority of respondents long for a solution that is both efficient to manage and provides users and customers with an outstanding experience. This white paper examines how your peers are looking at digitizing their businesses, lowering the total cost of ownership, and building an identity management strategy to support their business’s goals.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
Oggi il concetto di IT Transformation è accolto dalle aziende ancora di più che 12 mesi fa. Sebbene questo termine non sia sinonimo di Digital Transformation, i due concetti sono strettamente legati, poiché una Digital Transformation efficace è impossibile senza l'IT Transformation. Un'azienda che trasforma l'infrastruttura IT non deve più avvalersi di tecnologie rigide, manuali, in silos e legacy. Riscontra un aumento della velocità operativa, dell'efficienza, della scalabilità e della convenienza economica dell'IT: le attività sono automatizzate, i processi sono semplificati e vengono svincolate risorse. Tali miglioramenti a livello di IT alimentano una Digital Transformation su più larga scala, consentendo all'azienda di crescere nell'odierna economia digitale. L'azienda è in grado di superare la concorrenza in termini di innovazione, pensiero e velocità: in ultima analisi, riesce a guidare il cambiamento, anziché subirne gli effetti. Scopri di più sulle soluzioni Dell in collaboraz
Tags : 
    
Dell EMC Storage
Published By: Oracle     Published Date: May 05, 2017
I cambiamenti portati dal mondo digitale stanno impattando qualsiasi aspetto del business moderno.
Tags : 
    
Oracle
Published By: BMC ESM     Published Date: Jul 17, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database, it management, data management
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database
    
BMC ESM
Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
    
Wisegate
Published By: Jamf     Published Date: Mar 29, 2018
If you’re anything like your peers, you are evaluating your education technology on an annual basis to determine if it’s time for a refresh. While most schools conduct their device refreshes during the summer because teachers, staff and students are not present, this timing can prove costly as the market is flooded with devices from schools doing the same thing. To help school districts re-think their technology spending to focus more on total cost of ownership and residual value, as opposed to upfront cost, we’ve partnered with Diamond Assets — a technology buyback company — to explain: • The true value and cost of iPad and Chromebook in education • When schools receive the most trade-in value for their technology • How to prepare for and execute technology refreshes
Tags : 
    
Jamf
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
Oggi il concetto di IT Transformation è accolto dalle aziende ancora di più che 12 mesi fa. Somiglia a un altro termine corrente: "Digital Transformation". Ma di fatto, una Digital Transformation efficace è impossibile senza l'IT Transformation. Un'azienda che intraprende la trasformazione dell'infrastruttura IT non deve più avvalersi di tecnologie rigide, manuali, in silos e legacy. Riscontra un aumento della velocità operativa, dell'efficienza, della scalabilità e della convenienza economica dell'IT: le attività sono automatizzate, i processi sono semplificati e vengono svincolate risorse. Tali miglioramenti a livello di IT alimentano una Digital Transformation su più larga scala, consentendo all'azienda di crescere nell'odierna economia digitale. L'azienda è in grado di superare la concorrenza in termini di innovazione, pensiero e velocità: in ultima analisi, riesce a guidare il cambiamento, anziché subirne gli effetti. Scopri di più sulle soluzioni Dell in collaborazione con Inte
Tags : 
    
Dell EMC Storage
Published By: Oracle     Published Date: Jan 09, 2017
Udostepniajac wnioski z badan restauratorom z calego swiata, dzial Oracle Hospitality dazy do wykazania, ze zarzadzanie kadrami i zaopatrzeniem oraz zapobieganie stratom sa globalnymi wyzwaniami, które mozna pokonac poprzez uczynienie technologii kontroli kosztów fundamentem dzialalnosci.
Tags : 
hospitality, hotels, hotel management, millennials, customer experience, mobility
    
Oracle
Published By: IBM     Published Date: Apr 18, 2014
This IDC paper discusses the critical role of hardware infrastructure in business analytics deployments, citing best practices, the IDC's decision framework, and four client case studies - Wellpoint, Vestas, AXTEL, and Miami-Dade County. IDC's recommendation is that "infrastructure cannot — and should not — be an afterthought". Hardware infrastructure and software requirements must be determined in parallel to maximize the success of business analytics projects.
Tags : 
ibm, business analytics, deployment, hardware, infrastructure, business analytics solutions, workload
    
IBM
Published By: IBM     Published Date: Oct 07, 2014
This IDC paper discusses the critical role of hardware infrastructure in business analytics deployments, citing best practices, the IDC's decision framework, and four client case studies - Wellpoint, Vestas, AXTEL, and Miami-Dade County. IDC's recommendation is that "infrastructure cannot — and should not — be an afterthought". Hardware infrastructure and software requirements must be determined in parallel to maximize the success of business analytics projects.
Tags : 
ibm, idc, hardware infrastructure, business analytics deployments, software, software requirements, business analytics projects, infrastructure management, it management
    
IBM
Published By: Cisco EMEA     Published Date: Jun 05, 2018
In Cisco abbiamo aiutato migliaia di aziende a prepararsi per il GDPR, il che significa che ci è stata fatta praticamente ogni domanda possibile sull’argomento. Così abbiamo pensato di riassumere le domande che ci sentiamo rivolgere più spesso e di fornire alcune risposte utili per chi si sta avviando sul percorso della conformità al GDPR.
Tags : 
    
Cisco EMEA
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, business technology, data center
    
Courion
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee