X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 identity management authentication

Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Firewall RFI/RFP Template

Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more 

Evaluate Now

Documents related to » identity management authentication

Centrify Announces First Unified Identity Solution for SaaS and Mobile Management


Centrify Corporation, a provider of identify management solutions, announced the availability of the Centrify User Suite, SaaS Edition—the industry's first identity-as-a-service (IDaaS) solution to provide both robust Active Directory (AD)- and/or cloud-based single sign-on (SSO), access management, application management, and mobile management across any cloud, mobile, or on-premises application.

identity management authentication  a significant number of identity lifecycle management problems at a great price. Read More

From AD to LDAP through Virtualization: How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories


For web single sign-on (SSO), and consistent enforcement of authorization across all applications, many web access management (WAM) packages offer an excellent and proven approach. However, they assume a relatively homogeneous identity environment. This white paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, nonintrusive, and easy to deploy.

identity management authentication  assume a relatively homogeneous identity environment. This white paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, nonintrusive, and easy to deploy. Read More

Identix Leads Biometric Authentication


Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.

identity management authentication  individual privacy, protect personal identity, secure transactions and facilitate control and delivery of information over the wireless Web and Internet 24 hours per day, 7 days per week, anywhere in the world. Product Strategy and Trajectory Identix''s authentication systems have been used to lock down everything from bank vault''s, armored vehicles, MasterCard''s headquarters, and the Wall Street Journal''s printing facilities. Though its original customers were banks and the California Department of Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control


Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

identity management authentication  to Identity-based NAC: Using Identity to Put the Control in Network Access Control : Access Control | Access Control Card | Access Control Companies | Access Control Company | Access Control Equipment | Access Control Information | Access Control Level | Access Control Lock | Access Control Management | Access Control Management System | Access Control Manager | Access Control Methods | Access Control Model | Access Control Products | Access Control Requirements | Access Control Security System | Read More

Centralized Management for UNIX, Linux, Mac, Web, and Database Platforms


Integrating UNIX, Linux, Mac, Web, and database platforms includes securing all systems with the same authentication, authorization, and group policy services you use for Windows. How can this be done, without intrusive reconfiguration of your existing systems, while still providing the necessary granular administrative control? Learn how to leverage a centralized identity management tool leveraged with Active Directory.

identity management authentication  to leverage a centralized identity management tool leveraged with Active Directory. Read More

Goal-oriented Autonomic Business Process Management


Business process management (BPM) is an approach to administering business processes that involves people, organizations, and technologies—and can be carried out using varying levels of automation. Sadly, BPM often falls short of what it is intended to achieve. But there’s a fresh evolution of current BPM: goal-oriented autonomic BPM. Learn about the ideas, techniques, and benefits of autonomic and goal-oriented BPM.

identity management authentication  oriented Autonomic Business Process Management Business process management (BPM) is an approach to administering business processes that involves people, organizations, and technologies—and can be carried out using varying levels of automation. Sadly, BPM often falls short of what it is intended to achieve. But there’s a fresh evolution of current BPM: goal-oriented autonomic BPM. Learn about the ideas, techniques, and benefits of autonomic and goal-oriented BPM. Read More

Selecting Enterprise Asset Management (EAM) for Design, Operate, Maintain


Design-operate-maintain is an approach to asset management designed to maximize value over the entire asset lifecycle—from asset planning and design through years of maintenance and operation through to decommissioning and replacement. How can you select EAM software capable of supporting this enlightened approach? Download this white paper to find out.

identity management authentication  Enterprise Asset Management (EAM) for Design, Operate, Maintain Design-operate-maintain is an approach to asset management designed to maximize value over the entire asset lifecycle—from asset planning and design through years of maintenance and operation through to decommissioning and replacement. How can you select EAM software capable of supporting this enlightened approach? Download this white paper to find out. Read More

Alfanar IT Solutions-Enterprise Content Management


Alfanar IT, an information technology company operating in Saudi Arabia since 1995, in partnership with OpenText is providing enterprise content management (ECM) solutions to both government and private sectors—two sectors undergoing rapid automation and thus in need of ECM solutions in Saudi Arabia. Read this paper to see how alfanar IT plans to address these market needs and the improvements expected with OpenText.

identity management authentication  IT Solutions-Enterprise Content Management Alfanar IT, an information technology company operating in Saudi Arabia since 1995, in partnership with OpenText is providing enterprise content management (ECM) solutions to both government and private sectors—two sectors undergoing rapid automation and thus in need of ECM solutions in Saudi Arabia. Read this paper to see how alfanar IT plans to address these market needs and the improvements expected with OpenText. Read More

OutStart TrainingEdge.com Learning Management System Certification Report


The OutStart product TrainingEdge.com is now TEC Certified for online evaluation of learning management systems in the Human Capital Management (HCM) Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

identity management authentication  TrainingEdge.com Learning Management System Certification Report The OutStart product TrainingEdge.com is now TEC Certified for online evaluation of learning management systems in the Human Capital Management (HCM) Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst Read More

DP&C SmartFleet for Supply Chain Management of Transportation Management Systems Certification Report


DP&C SmartFleet is TEC Certified for online evaluation of transportation management system (TMS) solutions in the Supply Chain Management (SCM) Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, and in-depth analyst commentary.

identity management authentication  C SmartFleet for Supply Chain Management of Transportation Management Systems Certification Report DP&C SmartFleet is TEC Certified for online evaluation of transportation management system (TMS) solutions in the Supply Chain Management (SCM) Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, and in-depth Read More

Performance Management Framework for Mobile Workforce Management and Field Service


Mobile workforce management is a complex process that includes workforce planning, assignment decisions, and plan execution. To align this complex process with your business goals, you need to measure your performance and develop various corrective actions. This white paper discusses performance management—and how you can measure, analyze, and make decisions about the performance of your workforce and service organization.

identity management authentication  Management Framework for Mobile Workforce Management and Field Service Mobile workforce management is a complex process that includes workforce planning, assignment decisions, and plan execution. To align this complex process with your business goals, you need to measure your performance and develop various corrective actions. This white paper discusses performance management—and how you can measure, analyze, and make decisions about the performance of your workforce and service organization. Read More

Competency Management: the Compass for Strategic Talent Management


This white paper examines how to use a competency-based approach to build behaviors, skills, and knowledge. It explains how to integrate competencies into all phases of talent management to onboard, review, develop, motivate, and retain employees. It also shows the valuable contribution competencies can make in managing change and defusing turf battles that arise during downsizings, consolidations, and business reengineering.

identity management authentication  Management: the Compass for Strategic Talent Management Plateau delivers a best-of-breed talent management solution with deep functionality for learning management, performance management, compensation management and career and succession planning. This allows organizations to take a unified approach to develop, manage, reward and optimize their talent. Superior best-in-class talent management solutions can be deployed individually or together, enabling current and prospective customer to Read More

Do You Need a Content Management System?


Understanding what content management means is the first step to determine how a solution will suit your company. Because of the abundance of information both inside and outside of organizations, it is crucial to harness it as an effective business asset.

identity management authentication  You Need a Content Management System? Introduction The ongoing drive to save time and money drives organizations to look into content management. As the costs of software and implementation range from almost free to millions of dollars and choosing the right vendor or system is vital, this decision can be daunting. The term content management : What does it mean? Content management is a phrase you hear everywhere these days. Companies claim they do content management and vendors say that they sell Read More

Core HR Systems: Flawless Execution Enabling Strategic HR Management


Human resources (HR) professionals are tasked with ensuring employee needs are fulfilled and employer interests are protected. Management of core employee data, such as record-keeping, time and attendance, and payroll processing, is a cornerstone of every HR operation, and the way companies collect and maintain such data is critical. Find out what core HR management capabilities and systems today’s companies are using.

identity management authentication  HR Systems: Flawless Execution Enabling Strategic HR Management Human resources (HR) professionals are tasked with ensuring employee needs are fulfilled and employer interests are protected. Management of core employee data, such as record-keeping, time and attendance, and payroll processing, is a cornerstone of every HR operation, and the way companies collect and maintain such data is critical. Find out what core HR management capabilities and systems today’s companies are using. Read More

Warehouse Management Systems: Pie in the Sky or Floating Bakery?Part Two: The Pareto Principle, Processes, and People: Assessing Your Warehouse Management System Needs


To ensure your warehouse management system is implemented as painlessly as possible, you must assess your warehouse situation before you decide on a warehouse solution. Using the Pareto Principle, where a minority of inputs yields the majority results; examining your processes; evaluating your personnel; monitoring the progress of implementation; and testing are the best ways to ensure both a successful launch and long term return on investment.

identity management authentication  Management Systems: Pie in the Sky or Floating Bakery?Part Two: The Pareto Principle, Processes, and People: Assessing Your Warehouse Management System Needs Introduction After understanding the myths behind the claims of huge staff reductions , quick and easy implementation , and the fast and big return on investment, you need to know what type of features and functionality you should look for in a warehouse management system. The bells and whistles of a system might look enticing, but what Read More