Identity Management Security White Papers

(View All Report Types)
Secure Access for the Identities Driving Your Key Initiatives
sponsored by CyberArk
WHITE PAPER: Learn five ways to protect cloud and digital initiatives from identity-related attacks by securing users’ access to applications and more in this whitepaper.
Posted: 22 Nov 2023 | Published: 22 Nov 2023

CyberArk

Cloud Identity Buyer’s Guide
sponsored by Intel
WHITE PAPER: This guide discusses the issue of identity and access management (IAM) for cloud applications. It outlines the issues that need to be addressed, suggests some approaches to solving those issues and provides an overview of the Intel products that help companies manage their SaaS application identities more effectively and efficiently.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

Intel

Buyer’s Guide for Enterprise Single Sign-On
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance.
Posted: 25 Sep 2009 | Published: 01 Apr 2009

Oracle Corporation

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

PortalGuard

Managing data and application security risks cost effectively
sponsored by IBM
WHITE PAPER: This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit.
Posted: 01 Jul 2011 | Published: 01 Oct 2009

IBM

Beverly Hills Wealth Management Case Study
sponsored by Intel
WHITE PAPER: Read this case study and learn how and why Beverly Hills Wealth Management, a Registered Investment Advisor Firm, selected Intel's Identity and Access Management Solution that combines single sign-on, user account provisioning/deprovisioning, and access management for its users.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Intel

What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

Using Microsoft Active Directory in the Domino World
sponsored by PistolStar, Inc.
WHITE PAPER: Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

PistolStar, Inc.

Introduction to XML Gateways: Best Practices, Benefits & Requirements
sponsored by Forum Systems
WHITE PAPER: This paper will give you an overview of enabling virtualization and control, enforcing data-level privacy and integrity and control and audit information flow. You'll learn the best practices, benefits and requirements of XML Gateways.
Posted: 11 Sep 2009 | Published: 09 Sep 2009

Forum Systems