12 Results for:Microsoft identity and access management

  • Filter by: 

The Future of Identity and Access Management Tools

sponsored by Jumio Published: 20 Jun 2018 eGuide

Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity ...

View Now

Identity and Access Management for the Real World: Identity Governance

sponsored by One Identity Published: 31 Dec 2017 Resource

Discover the importance of identity governance and how you can effectively manage it while taking account of complexity, compliance and limited IT resources.

View Now

CW buyer’s guide: managing identity & access

sponsored by ComputerWeekly.com Published: 16 Aug 2013 Essential Guide

This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the ...

View Now

2018 Identity and Access Management Index Report

sponsored by Gemalto Published: 18 Apr 2018 Research Content

According to the Identity and Access Management Index, 90% of respondents admit that their organization's security policies around access management have been influenced by breaches of consumer services. Take a ...

View Now

Aligning Enterprise Identity and Access Management with CIO Priorities

sponsored by SearchSecurity.com Published: 25 Mar 2013 eGuide

In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.

View Now

Identity and Access Management in the Age of Intelligent Authentication

sponsored by TechTarget Published: 04 Dec 2018 Resource

In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are ...

View Now

Extended Enterprise Poses Identity and Access Management Challenges

sponsored by SearchSecurity.com Published: 26 Jul 2013 eGuide

Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.

View Now

Making Sure Your Identity and Access Management Program is Doing What You Need

sponsored by SearchSecurity.com Published: 22 Nov 2013 eGuide

Identity and access management (IAM) can cause a multitude of issues within an organization if not managed properly. This expert guide explores how to ensure your identity and access management services enable and ...

View Now

Top Trends Shaping IAM In 2018 Landscape: The Identity And Access Management Playbook

sponsored by OneLogin Published: 09 Jan 2018 Analyst Report

In this Forrester report, explore several trends that will have an impact of IAM budgets, skills, priorities, architectural decisions, the vendor landscape, and deployment options.

View Now

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM

sponsored by SearchSecurity.com Published: 26 Mar 2013 eGuide

This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.

View Now