Identity management

Identity management
Identity management

Available solutions are challenged to detect and protect identity and authenticate users. According to a recent study of password habits of American consumers, on average, computer users employ four or five passwords per day. The fact is that password hygiene among user groups of all kinds is incomplete. However, identity and authentication management is rapidly changing to compensate for this and combat other threats to user identity in an environment replete with technology.

Click here to download this ebook on identity management.

close

Next Article in Research

Sign up for our newsletters

POLL

More in Research

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

Virtualization

Virtualization

Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation ...

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."