Taming IAM in the extended enterprise with Zero Trust

Enterprise User Provisioning Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Password authentication resources

    Learn where you can find literature regarding the need for stronger password authentication, in this Ask the Expert Q&A. 

  • Review: With ID-Synch v4.0, you can easily manage many users

    HOT PICK: Security is enhanced through ID-Synch's ability to enforce strong password policy across platforms. But that's not the only benefit. 

  • How to distribute and monitor rights and permissions

    Learn how permissions and rights should be distributed and monitored in an organization in this security management Ask the Expert Q&A. 

  • Changing user IDs and passwords

    Learn why organizations should limit the number of username changes in this identity and access management ATE Q&A. 

  • 15 steps to hardening Windows Server 2003

    Learn 15 steps you can take right now to harden Windows Server 2003 against various threats 

  • How to build a user registration form

    Learn how to build a secure user registration form and some general Web-based system guidelines to guide you through the process. 

  • Best practices for password protection

    Learn what a keyring is -- how it works in conjuction with passphrases to keep sensitive and personal messages secure. Also learn what practices help keep passwords protected from hackers and crackers. 

  • Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. 

  • Sun converts Web SSO authentication to open source

    In announcing a new push into identity management, Sun Microsystems today turned over its code for Open Source Web Single Sign-On to improve its use and accessibility. 

  • Interview: Setting policy the IBM way

    Last week IBM announced its new Data Governance Council, formalizing a group of enterprises and IT organizations that have been meeting quarterly for more than a year to discuss ways of better protecting data against online thieves. Council member...