Your Search returned 6 results from our Editorial content

Sort By

IDENTITY MANAGEMENT

Identity guru Eve Maler wants to rebuild online trust

A leading light in identity management wants users to have more control over their data

   

IDENTITY MANAGEMENT

With Mozilla Persona on its deathbed, where is Identity...

A sound blend of password management and unified authentication is the future of identity management

IDENTITY MANAGEMENT

Kenya: Overcoming Challenges of the National Digital Register...

Kenya is about to unveil a digital system that will capture every citizen’s details. But there are glaring hurdles that the government cannot ignore.

   

IDENTITY MANAGEMENT

What is the Future of Identity Management?

In part two of our anonymity and online identity special we seek three industry professionals’ views on the ever changing role of identity management

IDENTITY MANAGEMENT

Is Anonymity Good or Bad?

In part one of a two part special, we investigate the current state of anonymity and online identity.

   
   

Your Search returned 25 results from our White Paper Library

Sort By
Quest Software

Identity Management

Top Eight Do's and Don'ts of Managing Access Control in...

In this technical brief, get eight recommendations to proactively address the problems of access control in a Microsoft-centric environment. Be proactive...


Quest Software

Identity Management

Simplify Your Approach to Identity and Access Management...

See how the Quest One Identity Solution addresses the challenges that arise in heterogeneous environments, and how Quest can help you meet these challenges....


Imperva

Security

Gartner: Understanding Vulnerability Management Life Cycle...

This Gartner research paper provides guidance on the elements of an effective vulnerability program. Learn how to make your IT environment more resilient...


NetIQ

Access Control

Is your User Management Process Getting you Down?

This paper explains how automating user privileges can help you improve the security and efficiency of user provisioning, change user and de-provisioning....


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

Readiness Assessments: Vital to Secure Mobility

See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.


Entrust

Identity Management

Defending the Internet of Things: Identity at the Core of...

This whitepaper, “Defending the Internet of Things: Identity at the Core of Security”, discusses meeting the demand for an IoT architecture that achieves...


Entrust

Authentication

Deriving a Trusted Mobile Identity from an Existing Credential...

This white paper explores proven deployment methods and real-world use cases for deriving a mobile identity from an existing credential.


Entrust

Identity Management

Entrust IdentityGuard Cloud Services Smart Credentials

Entrust IdentityGuard Cloud Services consolidate the issuance and management of multipurpose smartcards, mobile credentials and USB tokens.


Authentication

Dynamic Authentication: Smarter Security to Protect User...

This IDC paper explores emerging trends in authentication that are driving a need for stronger user access control.


RSA

IT Governance

Insuring Five Million Customers While Ensuring Automated...

Read the Friends Life case study to learn how the company achieved these benefits.


Previous 1 3

Blogs

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Do you use any voice/digital assistants to help you work?