Taming IAM in the extended enterprise with Zero Trust

Enterprise User Provisioning Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Companies share identity management struggles

    While most firms are pleased with the results of their identity management implementation, they faced many initial hurdles. 

  • Sun acquiring Vaau for identity management

    To better serve customers preoccupied with regulatory compliance and identity management, Sun has agreed to acquire enterprise role-management vendor Vaau. 

  • Is third-party software the only way to prevent access within a domain group?

    Identity management and access control expert Joel Dubin discusses how to prevent administrator access to certain documents within a domain group. 

  • Companies seek identity, access management strategies

    Experts say the road to strong access management and authentication begins with the basic problem of user provisioning. 

  • How to keep personally identifiable information out of access logs

    Are there products available that can hide the internal IP addresses recorded in log files? Maybe not, but in this expert Q&A, Michael Cobb reveals which tools can prevent the transfer of personally identifiable information to third parties. 

  • IBM aims identity suite at compliance, audit pains

    IBM has been on a shopping spree over the last several years to beef up its Tivoli identity and access management suite. Over the summer, Big Blue rolled out the results of its acquisition with Consul Risk Management, launching the Tivoli Compliance ... 

  • Should void user IDs be preserved in an audit history?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin explains how inadequate management of user access can result in compliance violations and information security threats for a corporation. 

  • user profile

    In a Windows environment, a user profile is a record of user-specific data that define the user's working environment. 

  • RADIUS (Remote Authentication Dial-In User Service)

    Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or s... 

  • logon (or login)

    In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.