Taming IAM in the extended enterprise with Zero Trust
  • Taming IAM in the extended enterprise with Zero Trust

    Taming IAM in the extended enterprise with Zero Trust

    Cloud and distributed computing have caused many enterprise IAM challenges. Eve Maler details how Forrester's Zero Trust model can help.

  • MORE HIGHLIGHTS

    privilege creep

    Privilege creep is the accumulation of IT access privileges beyond what an end user needs to do his or her job, enabling the potential abuse of pri...

  • How to thwart privilege creep with access reviews

    Most enterprises suffer from privilege creep among long-time employees. Peter Gregory explains how to limit user privileges with access reviews and...

  • Changes that make a difference

    This month, Information Security Magazine examines security industry changes that can really make a difference: improving identity management and b...

Enterprise User Provisioning Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Managing identities in hybrid worlds

    The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based IDaaS for hybrid cloud infrastructures, and mobile devices that are either an authentication token in ... 

  • Guide to managing identities and access control

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data... 

  • Meeting cloud computing compliance mandates

    November's edition of Information Security magazine covers a variety of IT security-related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting compliance mandates in the cloud, how the economy is affecting ... 

  • Why privileged account management is critical to today's data security

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also i... 

  • Special manager's guide: Monitoring identities

    In this month's issue of Information Security magazine, learn how using two-factor authentication to enhance organizational security. Meet regulations, tighten security and save money with better ID and access management. We review ForeScout Technolo... 

  • Identity crisis solved: Tips from a top identity management expert

    General Motors and its Chief Architect of Identity Management, Jarrod Jasper, reduced user profiles from 40 to one. Get tips on how they did it. Plus, find out more about PCI 101, how the credit card association believes how it can help reduce credit... 

  • privilege creep

    Privilege creep is the accumulation of IT access privileges beyond what an end user needs to do his or her job, enabling the potential abuse of privileges. 

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise... 

  • authentication, authorization, and accounting (AAA)

    Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. 

  • identity access management (IAM) system

    An identity management access (IAM) system is a framework for business processes that facilitates the management of electronic identities. 

  • onboarding and offboarding

    In identity management, onboarding is the addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access pr... 

  • role mining

    Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise... (Continued) 

  • user profile

    In a Windows environment, a user profile is a record of user-specific data that define the user's working environment. 

  • RADIUS (Remote Authentication Dial-In User Service)

    Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or s... 

  • logon (or login)

    In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer. 

  • federated identity management (FIM)

    Federated Identity Management (FIM) is an arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group... (Continued) 

  • See more Definitions on Enterprise User Provisioning Tools
About Enterprise User Provisioning Tools

Get tips and tricks on user provisioning, such as how to administer employee access and IDs and passwords, information on user account management and audit and analysis.