Taming IAM in the extended enterprise with Zero Trust

Enterprise User Provisioning Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What is identity management?

    Do you know what identity management is and how to properly manage it? This expert video featuring Kelly Manthey and Peter Gyurko explores the role of identity mangement and how it can benefit your enterprise. 

  • Identity management maturity model

    Learn about identity management and its capabilities in a detailed maturity model that highlights people, process and technology. 

  • Guide to managing identities and access control

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data... 

  • A primer for user privilege management in Windows Server 2008

    Privilege management can be a troublesome endeavor, but Windows Server 2008 introduces a multi-level privilege attribute system with better limits for standard users. Expert Randall Gamby explains the options in Windows Server 2008 for user privilege... 

  • Access certification technology helps financial firm with compliance

    Fortune 500 company uses access certification technology to meet new SOX-like requirements for non-public insurance companies. 

  • authentication, authorization, and accounting (AAA)

    Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. 

  • User provisioning best practices: Access recertification

    User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification pr... 

  • A buyer's guide to buying a provisioning system

    Video: Randall Gamby on what to look for in a provisioning vendor and how to choose the product that's right for your enterprise. 

  • Meeting cloud computing compliance mandates

    November's edition of Information Security magazine covers a variety of IT security-related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting compliance mandates in the cloud, how the economy is affecting ... 

  • Self-service user identity management: Pitfalls and processes

    While it might seem that self-service user identity management can save time and money, as well as keep information more current, there are a number of potential pitfalls. In this expert tip, Randall Gamby explains how to avoid these issues.