You searched for Identity and Access Management/ | SC Media

Your search for Identity and Access Management/ returned 1403 results

Your search for Identity and Access Management/ returned 1403 results

Sort Results:

Relevant Recent
Product Review

Novell Identity and Access Management

Novell Identity and Access Management is comprised of three modules: the Identity Manager, which includes user-provisioning tools; the Access Manager, which provides access rights to users, ensuring all users have access to the resources they need; and finally SecureLogin, which adds single credentialing capabilities so users have universal access with just one username and password.
2015 identity and access management ebook
Research

2015 identity and access management ebook

In many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.
Q&A: The transformation of identity and access management
Security News

Q&A: The transformation of identity and access management

Dave Hansen, general manager, CA Security Management, spoke at the RSA Conference about how technology convergence is transforming identity and access management.He discussed how identity management is moving beyond simple provisioning and is driving technology integration for access management, data loss prevention and role modeling and management. This Q&A dives deeper into the issues.
InfoSec Insider

The New Identity and Access Management Normal

A study of recent hacking attacks on corporations makes it obvious that (weak) password credentials are being used both inside and outside organizations, and are frequently the credential protecting remote access to the enterprise and its "crown jewels."  

InfoSec Insider

Get Your Identity and Access Management Under Control

That idea of checks for every customer action, the weight of it, the precautions put in place—armed security guards, security cameras, security alarms positioned in ample locations—all signal to would-be thieves that any attack on a bank is going to require serious skill, planning, and personal risk.

WebCast

Identity and Access Management for our New Remote Workforce

In this upcoming SC Media virtual conference, we look at these challenges as well as explore not only more traditional approaches, but also IAM-as-a-service, more up-and-coming solutions in what Gartner is calling Identity Analytics (founded more on risk-based methods versus a reliance on static rules), and more. We also get advice on the preparation, management…