identity compliance and security

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: SailPoint     Published Date: Feb 08, 2011
Learn the three best practices IT should follow to ensure that business managers actively and effectively participate in identity management compliance and security processes.
Tags : 
sailpoint, business management, identity management, compliance, security, government regulation
    
SailPoint
Published By: Gigya     Published Date: Jun 08, 2015
As channels fragment and consumer identities multiply, businesses are struggling to achieve a single customer view. This guide provides actionable strategies to achieve this “holy grail” to better understand your audience, build relevant experiences and grow customer relationships. Get tactics and examples to help you: Identify your customers across channels and devices Manage today's volume and variety of customer data Integrate and apply data across marketing campaigns Build more personalized customer journeys
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login, first-party data, integrations, identity compliance and security
    
Gigya
Published By: Gigya     Published Date: Jun 08, 2015
Marketers are struggling to connect with consumers across all available outlets while still providing an aligned customer experience. The white paper examines three key ways to create a successful omni-channel experience while establishing cohesive brand and customer identities. Learn how to: Develop an interactive mobile strategy Streamline physical and digital interactions Engage customers across channels
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login, first-party data, integrations, identity compliance and security
    
Gigya
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : 
ibm, user access, enhanced security, security risk
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : 
ibm, identity governance, risk control, risk management, data security
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: