New & Notable
Identity Management Technology and Strategy News
December 14, 2012
Verizon and Criterion Systems will conduct a series of tests of a new validation process being designed for sensitive online transactions.
July 20, 2011
President Obama's proposed Identity Ecosystem seeks to lock down personal credentials, but is it actually feasible?
February 17, 2011
Verizon enhanced its enterprise identity management services with identity registration, credential provisioning and risk-based authentication.
March 02, 2010
At the 2010 RSA Conference, Scott Charney, Microsoft's top Trustworthy Computing executive, discussed the software giant's new approach to botnet protection, detailed its new identity management technologies and explained why cloud computing risks ...
Identity Management Technology and Strategy Get Started
Bring yourself up to speed with our introductory content
Here's everything you need to know to ensure secure IAM, no matter how complex your network environment. Continue Reading
Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user ... Continue Reading
In identity management, onboarding is the addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access ... Continue Reading
Evaluate Identity Management Technology and Strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Video: Learn how to use KeePass, the free password-management tool that can offer cash-strapped enterprises a way to help employees encrypt and secure their work-related passwords. Continue Reading
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity Continue Reading
Tying log management to user identity shortens incident response and forensics investigation cycles. Learn how compliance has mandated that organizations determine not only when incidents occurred, but who is responsible for unauthorized access. Continue Reading
Manage Identity Management Technology and Strategy
Learn to apply best practices and optimize your operations.
This Security School covers need-to-know information about cloud-based identity and access management, including best practices as well as its pros and cons. Continue Reading
Download the latest Pocket Guide to Managing Identities in a Hybrid World. Continue Reading
Problem Solve Identity Management Technology and Strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
An authentication framework based on a decentralized operational model is commonplace in the financial-services market, but complicates compliance. In this tip, Randall Gamby explains how financial companies can migrate to a centralized ... Continue Reading