Your Search returned 7 results from our Editorial content

Sort By

IDENTITY MANAGEMENT

Which privileged identity management tools work best?

Discover what real users think of privileged identity management solutions

   

IDENTITY MANAGEMENT

Identity guru Eve Maler wants to rebuild online trust

A leading light in identity management wants users to have more control over their data

IDENTITY MANAGEMENT

With Mozilla Persona on its deathbed, where is Identity...

A sound blend of password management and unified authentication is the future of identity management

   

IDENTITY MANAGEMENT

Kenya: Overcoming Challenges of the National Digital Register...

Kenya is about to unveil a digital system that will capture every citizen’s details. But there are glaring hurdles that the government cannot ignore.

IDENTITY MANAGEMENT

What is the Future of Identity Management?

In part two of our anonymity and online identity special we seek three industry professionals’ views on the ever changing role of identity management

   

IDENTITY MANAGEMENT

Is Anonymity Good or Bad?

In part one of a two part special, we investigate the current state of anonymity and online identity.

   

Your Search returned 26 results from our White Paper Library

Sort By
Imperva

Security

Gartner: Understanding Vulnerability Management Life Cycle...

This Gartner research paper provides guidance on the elements of an effective vulnerability program. Learn how to make your IT environment more resilient...


NetIQ

Access Control

Is your User Management Process Getting you Down?

This paper explains how automating user privileges can help you improve the security and efficiency of user provisioning, change user and de-provisioning....


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

Readiness Assessments: Vital to Secure Mobility

See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.


Entrust

Identity Management

Defending the Internet of Things: Identity at the Core of...

This whitepaper, “Defending the Internet of Things: Identity at the Core of Security”, discusses meeting the demand for an IoT architecture that achieves...


Entrust

Authentication

Deriving a Trusted Mobile Identity from an Existing Credential...

This white paper explores proven deployment methods and real-world use cases for deriving a mobile identity from an existing credential.


Entrust

Identity Management

Entrust IdentityGuard Cloud Services Smart Credentials

Entrust IdentityGuard Cloud Services consolidate the issuance and management of multipurpose smartcards, mobile credentials and USB tokens.


Authentication

Dynamic Authentication: Smarter Security to Protect User...

This IDC paper explores emerging trends in authentication that are driving a need for stronger user access control.


RSA

IT Governance

Insuring Five Million Customers While Ensuring Automated...

Read the Friends Life case study to learn how the company achieved these benefits.


RSA

Identity Management

Provisioning 2.0: The Future of Provisioning

This white paper provides an overview of the goals, approach, and benefits of Provisioning 2.0.


RSA

Identity Management

The Evolution of Provisioning

This infographic provides a history of provisioning from 1990 to today’s new governance-driven provisioning. Key facts and stats are highlighted along...


Previous 1 3

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

Blockchain For Dummies: What you really need to know

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?