identity management - News, Features, and Slideshows

News about identity management
Features about identity management
  • Novell, CA push to secure identity, security in cloud

    Two major identity management companies are forging ahead with products designed to satisfy what a cloud-computing consortium calls one of the trickiest problems preventing secure and automated connections between internal IT infrastructures and external service providers: identity and authentication.

    Written by Kevin Fogarty07 Aug. 09 05:26
  • Tools to identify anonymous users online

    After posting 5 Free Ways to Track Online Leaks of Information, I received numerous requests asking how to identify the online source leaking the confidential company information. Here are some techniques a corporate investigator can use to identify anonymous users online.

    Written by Brandon Gregg07 July 09 00:23
  • Your Identity: 'Costanza Style'

    Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.

    Written by David Miller11 Feb. 09 10:53

Whitepapers about identity management

  • Discover the workplace of the future, today

    Cloud, identity management and enterprise mobility technologies can provide significant benefits for business efficiency and promote a collaborative workforce. However, it can often result in conflicts of interests between business heads and IT leaders, both who have different concerns and expectations on how to implement these solutions to benefit the company. <p> This whitepaper looks at how a collaborative approach can benefit both IT and business stakeholders, resulting in increased business flexibility and security. Included in this whitepaper are also 5 step by step considerations for both business and IT leaders to reap the benefits of these platforms by adopting synergistic strategies.

  • Security 101

  • How Google Tackles Security | Webcast