ID Management Reports

Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
Posted: 12 Nov 2021 | Published: 16 Nov 2021

TechTarget ComputerWeekly.com

Extend your network security to where you need it.
sponsored by Palo Alto Networks
WHITE PAPER: With hybrid and remote work, network security must adapt. Palo Alto Networks' Prisma Access integrates with NGFWs, extending security across on-premises, cloud, and remote environments. Discover how to maintain consistent security wherever work happens in this paper.
Posted: 03 May 2024 | Published: 03 May 2024

Palo Alto Networks

The great IAM - Time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by TechTarget Security
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

TechTarget Security

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Handbook: Identity and Access Management
sponsored by TechTarget Security
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Computer Weekly – 11 June 2013: Do you know who is on your network?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at how identity and access management can improve your information security. We go behind the scenes at Microsoft HQ to find out how the software giant deals with product security. And the CIO from Domino's Pizza tells us why the retailer is moving to the cloud. Read the issue now.
Posted: 10 Jun 2013 | Published: 11 Jun 2013

TechTarget ComputerWeekly.com

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Using Microsoft Active Directory in the Domino World
sponsored by PistolStar, Inc.
WHITE PAPER: Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

PistolStar, Inc.