Identity Security Malaysia IntroductionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Identity Security Malaysia Introduction returned the following results.
RSS What is RSS?
Related Categories

 •   Identity Management/ User Provisioning
 •   Access Control
 •   Security Policies
 •   Data Security
 •   Security Monitoring
 •   Authentication / Password Management
 •   Network Security
 •   Application Security
 •   Endpoint Security
 •   Managed Security Services

Related Searches
 •   Costing Identity Security Malaysia
 •   Identity Collection
 •   Identity Definitions
 •   Identity Function
 •   Identity Manager
 •   Identity Risk
 •   International Identity
 •   Production Identity Security Malaysia
 •   Quality Identity Security
 •   Testing Identity
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Reinforce Business Objectives and Achieve ROI with Internet Identity Security by Ping Identity Corporation

June 17, 2009 - (Free Research)
Read this white paper to learn how after deploying PingFederate or PingConnect your organization will yield a high return on investment and run more efficiently and will have distinct competitive advantage over companies that do not leverage Internet Identity Security Software. 
(WHITE PAPER) READ ABSTRACT |

Interpol, Entrust Develop Advanced Multipurpose SmartCard by Entrust, Inc.

November 30, 2011 - (Free Research)
See how in this real world case study the power of advanced enterprise security was harnessed to create the most advanced multipurpose credentials in the world for INTERPOL. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Uniting SIM and IAM to Boost Security by ArcSight, an HP Company

April 07, 2011 - (Free Research)
When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender. 
(EGUIDE) READ ABSTRACT |

Symantec Intelligence Report – May 2013 by Symantec Corporation

May 31, 2013 - (Free Research)
Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future. 
(WHITE PAPER) READ ABSTRACT |

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management by IBM

March 13, 2009 - (Free Research)
This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security. 
(DEMO) READ ABSTRACT |

Boost Cloud Security with Intel® AES-NI by Intel

March 10, 2011 - (Free Research)
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance. 
(VIDEO) READ ABSTRACT |

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match by Informatica

December 2008 - (Free Research)
This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems. 
(BOOK) READ ABSTRACT |

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On by Ping Identity Corporation

August 2009 - (Free Research)
Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important. 
(VIDEOCAST) READ ABSTRACT |

How One School Enhanced Their Educational Experience and Secured Their Campus by Extreme Networks (E-mail this company)

October 2012 - (Free Research)
This case study reveals which leading edge network Price of Wales Island International School used to enhance their educational experience for staff and students and to boost campus security. 
(CASE STUDY) READ ABSTRACT |

Introduction to XML Gateways: Best Practices, Benefits & Requirements by Forum Systems

September 2009 - (Free Research)
This paper will give you an overview of enabling virtualization and control, enforcing data-level privacy and integrity and control and audit information flow. You'll learn the best practices, benefits and requirements of XML Gateways. 
(WHITE PAPER) READ ABSTRACT |

Modern Infrastructure: ASEAN Special Edition, April 2014 by SearchDataCenter.com

April 2014 - (Free Research)
This issue looks at the adoption of a cloud computing in the Asean region with a case study from a Singapore based multinational. It also outlines the challenges and predictions for the region. 
(EZINE) READ ABSTRACT |

IDC Buyer Case Study: Customer-Centric, User-Friendly Videoconferencing by Atos Origin

July 2012 - (Free Research)
This IDC Buyer Case Study explores which videoconferencing solution Mydin, Malaysia's largest retailer enterprise, put in place to help connect and communicate, reduce costs, and achieve an optimal ROI. 
(WHITE PAPER) READ ABSTRACT |

IDC Buyer Case Study: Customer-Centric, User-Friendly Videoconferencing by Vidyo, Inc.

July 2012 - (Free Research)
This IDC Buyer Case Study explores which videoconferencing solution Mydin, Malaysia's largest retailer enterprise, put in place to help connect and communicate, reduce costs, and achieve an optimal ROI. 
(WHITE PAPER) READ ABSTRACT |

YTL Communications delivers nation-wide virtual learning education with Red Hat Solutions by Red Hat and Intel

December 2013 - (Free Research)
In this case study, you’ll discover how Red Hat helped one telecommunication provider deliver a scalable, cost-effective cloud platform for e-learning in schools in Malaysia. 
(WHITE PAPER) READ ABSTRACT |

Restore Balance With Authentication Technologies by TechTarget

March 2014 - (Free Research)
When it comes to identity management you can never be too careful, and with the addition of cloud identity on the market there's more uncertainty than ever as to whether it's ready for the spot light. Take this survey to access this informative e-guide providing you with a comprehensive introduction and best practices for two-factor authentication. 
(RESOURCE)

Turn Identity into a Business Enabler, Not an IT Bottleneck by Radiant Logic, Inc.

December 2013 - (Free Research)
This white paper highlights the benefits of a federated identity that can help you improve efficiencies, reduce risks, and maximize ROI. 
(WHITE PAPER) READ ABSTRACT |

The Key to Seamless SSO by Radiant Logic, Inc.

April 2014 - (Free Research)
This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection. 
(WHITE PAPER) READ ABSTRACT |

Identify And Influence Identity Stakeholders by Ping Identity Corporation

July 2012 - (Free Research)
This report outlines the stakeholder needs of the Identity and Access Management playbook, breaking down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Intelligence: Transforming Enterprise Security by IBM

March 2013 - (Free Research)
Consult this white paper to learn more about how the concepts of business IT are transforming. It describes the nature of identity and access intelligence and the factors that are behind this new and emerging aspect of security evolution. 
(WHITE PAPER) READ ABSTRACT |

When millions need access: Identity management in an increasingly connected world by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Increase productivity and security with identity and access management by IBM

March 2013 - (Free Research)
In this white paper, explore new, updated techniques for complex identity management in the cloud, aimed at improving productivity and better securing privileged information. 
(WHITE PAPER) READ ABSTRACT |

Managing Identities and Access in the Cloud by IBM

December 2011 - (Free Research)
Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data. 
(WHITE PAPER) READ ABSTRACT |

Ping Federate 7 Product Guide by Ping Identity Corporation

March 2014 - (Free Research)
This whitepaper provides a complete guide to PingFederate, a leading enterprise identity bridge for standards-based federated identity management. 
(WHITE PAPER) READ ABSTRACT |

Avoiding Insider Threats to Enterprise Security by IBM

October 2012 - (Free Research)
This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities. 
(WHITE PAPER) READ ABSTRACT |

Oracle Identity Analytics- A Business Perspective by Oracle Corporation

February 2010 - (Free Research)
This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts