Management of Identity Reports

The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly – 23 October 2018: Where next for digital identity?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Oct 2018

TechTarget ComputerWeekly.com

The great IAM - time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

New Data Classifications Vital to Information Governance and Security
sponsored by STEALTHbits
EGUIDE: In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

STEALTHbits

Identity and Access Management (IAM) 101
sponsored by Beta Systems
EGUIDE: Identity and access management (IAM) is critical for provisioning (or restricting) user access to certain data, applications and networks – but how exactly does IAM work? And what steps can be put in place to ensure its effectiveness? Read this exclusive e-guide to find out.
Posted: 02 Aug 2022 | Published: 29 Jul 2022

Beta Systems

Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
sponsored by ModoModo
EGUIDE: If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
Posted: 23 Feb 2017 | Published: 17 Feb 2017

ModoModo