User ID Management White Papers

(View All Report Types)
Implementing Database Security and Auditing: Using Granular Access Control
sponsored by Guardium, an IBM Company
WHITE PAPER: In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Guardium, an IBM Company

Buyer's Guide: Select the Right Solution for Identity and Access Assurance
sponsored by IBM
WHITE PAPER: Consult this buyer's guide to help you select the right technology for identity and access assurance -- one that will control access within, across, and between businesses.
Posted: 06 May 2014 | Published: 30 Apr 2013

IBM

Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives
sponsored by IBM
WHITE PAPER: When IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

One Identity

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

A Foundation for Next-Generation Data Center Security
sponsored by Citrix
WHITE PAPER: This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
Posted: 13 Aug 2013 | Published: 28 Sep 2012

Citrix

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
sponsored by Intel
WHITE PAPER: Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
Posted: 10 May 2011 | Published: 10 May 2011

Intel

Dark Pools of Liquidity: Understanding & Technology dependencies for the future
sponsored by Wipro
WHITE PAPER: This white paper provides insight into the dark pools of liquidity, discusses the mechanism of dark pools trading, advantages and how technology would impact the operations or provide benefits in trading over this medium.
Posted: 13 May 2009 | Published: 12 May 2009

Wipro

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd