User ID Management White Papers

(View All Report Types)
What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

One Size Does Not Fit All: A Closer Look at Enterprise Application Integration Technology
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the driving forces that have made enterprise application integration so critical, reviews available integration approaches and outlines areas of consideration when selecting the best methodology for individual enterprise requirements. Read this paper to learn more.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

IntraLinks, Inc

Provide Access Control With Innovative Solutions From IBM
sponsored by IBM
WHITE PAPER: Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Dark Pools of Liquidity: Understanding & Technology dependencies for the future
sponsored by Wipro
WHITE PAPER: This white paper provides insight into the dark pools of liquidity, discusses the mechanism of dark pools trading, advantages and how technology would impact the operations or provide benefits in trading over this medium.
Posted: 13 May 2009 | Published: 12 May 2009

Wipro

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Introduction to XML Gateways: Best Practices, Benefits & Requirements
sponsored by Forum Systems
WHITE PAPER: This paper will give you an overview of enabling virtualization and control, enforcing data-level privacy and integrity and control and audit information flow. You'll learn the best practices, benefits and requirements of XML Gateways.
Posted: 11 Sep 2009 | Published: 09 Sep 2009

Forum Systems

IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

One Identity

3 undeniable use cases for automated IAM controls
sponsored by IBM
WHITE PAPER: This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity.
Posted: 01 Jul 2011 | Published: 03 Jan 2011

IBM

Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: This guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Celestix Networks

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata