Your Search returned 7 results from our Editorial content

Sort By


Which privileged identity management tools work best?

Discover what real users think of privileged identity management solutions



Identity guru Eve Maler wants to rebuild online trust

A leading light in identity management wants users to have more control over their data


With Mozilla Persona on its deathbed, where is Identity...

A sound blend of password management and unified authentication is the future of identity management



Kenya: Overcoming Challenges of the National Digital Register...

Kenya is about to unveil a digital system that will capture every citizen’s details. But there are glaring hurdles that the government cannot ignore.


What is the Future of Identity Management?

In part two of our anonymity and online identity special we seek three industry professionals’ views on the ever changing role of identity management



Is Anonymity Good or Bad?

In part one of a two part special, we investigate the current state of anonymity and online identity.


Your Search returned 33 results from our White Paper Library

Sort By


Gartner: Understanding Vulnerability Management Life Cycle...

This Gartner research paper provides guidance on the elements of an effective vulnerability program. Learn how to make your IT environment more resilient...


Access Control

Is your User Management Process Getting you Down?

This paper explains how automating user privileges can help you improve the security and efficiency of user provisioning, change user and de-provisioning....

Cisco Systems, Inc.

BYOD (Bring Your Own Device)

Readiness Assessments: Vital to Secure Mobility

See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.


Identity Management

Defending the Internet of Things: Identity at the Core of...

This whitepaper, “Defending the Internet of Things: Identity at the Core of Security”, discusses meeting the demand for an IoT architecture that achieves...



Deriving a Trusted Mobile Identity from an Existing Credential...

This white paper explores proven deployment methods and real-world use cases for deriving a mobile identity from an existing credential.


Identity Management

Entrust IdentityGuard Cloud Services Smart Credentials

Entrust IdentityGuard Cloud Services consolidate the issuance and management of multipurpose smartcards, mobile credentials and USB tokens.


Dynamic Authentication: Smarter Security to Protect User...

This IDC paper explores emerging trends in authentication that are driving a need for stronger user access control.


IT Governance

Insuring Five Million Customers While Ensuring Automated...

Read the Friends Life case study to learn how the company achieved these benefits.


Identity Management

Provisioning 2.0: The Future of Provisioning

This white paper provides an overview of the goals, approach, and benefits of Provisioning 2.0.


Identity Management

The Evolution of Provisioning

This infographic provides a history of provisioning from 1990 to today’s new governance-driven provisioning. Key facts and stats are highlighted along...

Previous 1 3 4

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?