IM (Identity Management) Reports

The great IAM - time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Oct 2019

TechTarget ComputerWeekly.com

Computer Weekly – 12 December 2023: Shaping the modern workplace
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.
Posted: 11 Dec 2023 | Published: 12 Dec 2023

TechTarget ComputerWeekly.com

CW Benelux - May 2017: 3D printing on the rise
sponsored by TechTarget ComputerWeekly.com
EZINE: Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.
Posted: 08 Feb 2021 | Published: 04 May 2017

TechTarget ComputerWeekly.com

How IAM Addresses Unstructured Content Security Risks
sponsored by STEALTHbits
EGUIDE: Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.
Posted: 11 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

The Digital Certificate: How It Works, Which to Buy
sponsored by TechTarget Security
EBOOK: If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017

TechTarget Security

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Mobile Security Challenges: Solutions and Best Practices
sponsored by BlackBerry
EGUIDE: Today is an era of "mobile-first" everything and companies are transforming their operations by leveraging mobile technology. However, mobility hasn't come without its challenges. Discover solutions to common mobility issues such as identity management, and how to ensure your mobile-first operations are mission critical and IoT optimized.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

Getting Started with Cloud IAM Services
sponsored by OneLogin
EGUIDE: In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
Posted: 24 Jul 2017 | Published: 19 Jul 2017

OneLogin