Skip to content
 

iam

Results 126 - 150 of 257Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
Published By: Okta     Published Date: Oct 01, 2010
Controlling who is granted secure access to which applications and data becomes a real challenge when users can get access from any browser, at any time, from any place.
Tags : 
okta, cloud area network, scaling saas applications, security, identity management, iam, active directory, google apps, saas, cloud, sso, saml
    
Okta
Published By: Okta     Published Date: Oct 12, 2010
This white paper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
okta, identity and access management, saas applications, iam, password fatigue, compliance, application integration, identity management, iam, active directory, google apps, saas, cloud, sso, saml
    
Okta
Published By: Okta     Published Date: Oct 18, 2010
This paper will discuss three different options for integrating Active Directory with your SaaS applications and analyze how effectively they meet the requirements above.
Tags : 
okta, active directory integration, saas applications, software as a service, smb, identity management, iam, active directory, google apps, saas, cloud, sso, saml
    
Okta
Published By: Okta     Published Date: Jan 30, 2013
This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
top 8, access management, challenges, saas applications, okta
    
Okta
Published By: MEDIAmobz     Published Date: Apr 07, 2014
Are you product launch plans competitive? Once upon a time watching video online was a niche activity. As video has become widely available on mobile devices, it was become a mainstream activity. According to eMarketer's March 2014 report, video has and will continue to enjoy the highest ad-spending growth rate across both mobile and desktop. This white paper speaks to mission-critical inclusion of video in our product launch plans.
Tags : 
mediamobz, marketing, product launch, promotion, mobile marketing, video, advertising, ad spending, growth rate, online video, interactive marketing, customer experience/engagement, online video marketing
    
MEDIAmobz
Published By: MEDIAmobz     Published Date: May 21, 2014
Are your product launch plans competitive? Once upon a time watching video online was a niche activity. As video has become widely available on mobile devices, it was become a mainstream activity. According to eMarketer's March 2014 report, video has and will continue to enjoy the highest ad-spending growth rate across both mobile and desktop. This white paper speaks to mission-critical inclusion of video in your product launch plans.
Tags : 
mediamobz, product launch, online video marketing, customer experience, customer engagement, interactive marketing, emarketing, mobile devices, mobile marketing, mobile device, customer experience/engagement
    
MEDIAmobz
Published By: CareCloud     Published Date: Dec 18, 2013
Find out how three physicians are using technology to effectively battle operational difficulties and declining profitability.
Tags : 
carecloud, quantiamd, ehr, practice profitability, practice profitability index, ppi, outsourced billing, practice management, practice management systems, healthcare technology
    
CareCloud
Published By: Gigya     Published Date: Jun 08, 2015
The rise of eCommerce, social networks, mobile and connected devices has surfaced SAML as a key solution to develop a customer identity access management (cIAM) strategy to keep up with the flood of cross-channel consumer data.
Tags : 
ecommerce, social networks, mobile devices, customer identity access management, cross-channel consumer data
    
Gigya
Published By: Okta     Published Date: Nov 09, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn more.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits
    
Okta
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Oggi la tecnologia digitale è ovunque: cloud, mobility, social network e Internet of Things stanno cambiando il modo in cui tutti noi lavoriamo e ci divertiamo. Questo mondo digitale in rapida evoluzione sta anche rimodellando il rapporto tra le aziende e i clienti, che ora si aspettano dai propri brand preferiti un'esperienza utile e interattiva. Anche la sicurezza è motivo di preoccupazione. Azienda e clienti si scambiano un volume in continuo aumento di dati sensibili, aumentando i fattori di rischio.La trasformazione del mercato sta inoltre intensificando la concorrenza. Come osserva l'analista Mark Raskino, "Come conseguenza, tutti i contendenti hanno rielaborato le proprie strategie e si sono risvegliate alla potenza del business digitale nello stesso momento. Il conflitto è quindi inevitabile.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nel suo libro Psicologia della scienza, pubblicato nel 1966, lo psicologo americano Abraham Maslow analizzò la teoria secondo cui coloro che operavano in ambito psicologico necessitavano di un approccio alla cura da più punti di vista per favorire la genesi di nuove idee, senza limitarsi a utilizzare le stesse teorie e le medesime tecniche create da Freud e dai suoi seguaci in un passato ormai remoto. Partendo dal presupposto che può risultare difficile cambiare il proprio punto di vista, Maslow scrisse: "[...] La tentazione, se l'unico strumento che hai è un martello, è di trattare tutti i problemi come se fossero chiodi". Abbiamo fatto tutti questa esperienza. Siamo talmente abituati a fare le cose come si facevano in passato che a volte non ci chiediamo neppure più il motivo per cui continuiamo a farle oggi.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
En la economía digital, las interfaces de programación de aplicaciones (API) son esenciales para ejecutar ideas con rapidez y aprovechar nuevas oportunidades de negocio. Constituyen los pilares fundamentales de la transformación digital, ya que permiten a las organizaciones ofrecer experiencias de cliente excepcionales, crear flujos de ingresos nuevos y conectar a los empleados, los partners, las aplicaciones y los dispositivos con los datos en cualquier momento y lugar.Las API no son necesariamente una tecnología nueva, pero en el mundo digital actual, han adquirido mayor relevancia y se han vuelto importantes para todas las facetas de la empresa. A su vez, esto ha aumentado la demanda de una gestión de API eficaz. Ahora bien, ¿cómo es una solución eficaz?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Nei Project Management Office di alcune delle aziende più importanti e affermate del mondo è in corso una trasformazione radicale. In qualità di provider di soluzioni globali di project and portfolio management, con clienti che includono più della metà delle aziende Fortune 100, CA Technologies si trova in una posizione unica per comprendere come questo cambiamento si sta evolvendo rapidamente nei vari settori.
Tags : 
cinque, pilastri, del, pmo, oggi
    
CA Technologies EMEA
Published By: Adobe     Published Date: Nov 09, 2017
In our 35-criteria evaluation of data management platforms (DMPs), we identified the 11 most significant ones — The ADEX, Adform, Adobe, KBM Group, Lotame, MediaMath, Neustar, Nielsen, Oracle, Salesforce, and Turn — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : 
idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam
    
F5 Networks Inc
Published By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : 
layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam
    
Entrust Datacard
Published By: MEDIAmobz     Published Date: Nov 14, 2014
Ever done a webinar? If so, you know they are one of the most effective types of B2B marketing out there. Many companies host and thousands of people attend webinars, but few have considered a unique technique in webinar marketing: breaking them down into digestible bites.
Tags : 
mediamobz, webinar, webinar video, b2b marketing, webinar marketing, video marketing, online video marketing
    
MEDIAmobz
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
Jack Porco from William Beaumont Hospital and Mike Stephens from Atkins give an overview of their use of IBM Maximo Asset Management for facilities management and how it helped them run their buildings... smarter.
Tags : 
ibm, smarter buildings, solutions, asset management
    
IBM US Smarter Buildings
Published By: Cherwell Software     Published Date: Apr 24, 2019
Founded over a century ago for the betterment of society, The London School of Economics and Political Science (LSE) is one of the foremost social science universities in the world. The prestigious University has produced some of the leading lights in fi elds including law, economics, history and politics, with dozens of Nobel Prize winners and Members of Parliament among its alumni. Today, the LSE is home to more than 10,000 students and 3,300 staff, placing considerable demand on its IT service management team. However, as the university continued to expand in scope and complexity, its support team looked for new solutions to overcome the infl exible and outdated service management tools. Nicos Kyriacou, IMT Service Management Offi cer at LSE, explained: “We had the same tool for over a decade and it was so rigid that we were forced to adapt our working practices around it, rather than vice versa.
Tags : 
    
Cherwell Software
Published By: FICO     Published Date: Nov 17, 2016
Você já se perguntou como um grande varejista da América do Sul modernizou a concessão de crédito? A fim de manter a competitividade, os varejistas precisam tomar decisões de crédito cada vez mais rápidas no ponto de venda. Este foi um desafio para este grande varejista da América do Sul, que usava uma estrutura antiquada (com mainframe) e um processo manual para determinar quais propostas de crédito deveriam ser aprovadas.
Tags : 
    
FICO
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.