Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Public Key Infrastructure (PKI) RFI/RFP Template
PKI Functionality, PKI Technology
Get this template
Business Intelligence (BI)
Business intelligence (BI) and performance management applications enable real-time, interactive access, analysis, and manipulation of mission-critical corporate information. These applications pro...
Start evaluating software now
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
The Age of Audit: Identity and Access Management in Provision and Compliance
Organizations are overwhelmed with how to begin implementing identity and access management (IAM) solutions. They are scratching their heads and asking
| Identity Paradigm | Identity Selector | IDM | IM Implementation | Implement IDM | Implement IAM | Implement IAM Implementation | Implement Identity and Access Management | Implement Identity Management | Implement Identity Management Systems | Implement Identity Management Tool | Implement Security Policy | Implementation Analysis | Implementation Management | Implementation Process | Implementing IDM | Implementing IAM | Implementing IAM Implementation | Implementing Identity and Access Management |
Madness? Mergers, Acquisitions, and Divestitures
One of the riskiest moves company stakeholders can make is to acquire and merge with another company or to divest themselves of company assets. Despite the best
the Postmerger Integration Phase Identity Management Resource and Portfolio Management Master-Data Management Solutions for Building a Business Process Platform Building on an Integrated IT Environment The Hallmarks of Successful Mergers and Acquisitions Where to Go to Beat the Odds EXECUTIVE SUMMARY AVOIDING FAILURE IN MERGERS, ACQUISITIONS, AND DIVESTITURES Human beings take risks. In business, one of the riskiest moves company stakeholders can take is to acquire and merge with another company or to div
Managing Compliance and Access For The Cloud
You can use identity and access management to improve security, reduce risk, and meet compliance requirements for cloud systems. But are you aware of the
Cloud You can use identity and access management to improve security, reduce risk, and meet compliance requirements for cloud systems. But are you aware of the identity requirements for access controls and audit for software-as-a-service (SaaS) applications? Or about the compliance regulations governing sensitive information in SaaS and cloud applications? Discover how to address the needs of SaaS and cloud-based identities.
Best Practices for Role Management
Role management is becoming recognized as an essential aspect of an organization''s identity management and security. But role management goes well beyond simply
aspect of an organization''s identity management and security. But role management goes well beyond simply assigning passwords or user IDs. You must also manage and govern the roles related to the core business activities of your organization. Start by looking at key considerations for choosing a role management solution, and benefit from suggested best practices.
Thawte is a global provider of digital certificate solutions that provide Internet users with peace of mind when sending information to web sites, sending e
used as proof of identity online and that can provide for the protection of all information sent over the World Wide Web.
Queue Global Information Systems Corp.
Located in Vancouver, British Columbia (Canada), Queue Global Information System Corp. develops IT solutions to companies and individuals from fraud, identity
and individuals from fraud, identity theft, Internet fraud, credit card, and unauthorized access to privileged information on a global scale.
Delivering Identity and Context as a Service
Delivering smarter security and more customized services are at the top of any IT agenda. But while these goals may appear quite different from a business and
Identity and Context as a Service Delivering smarter security and more customized services are at the top of any IT agenda. But while these goals may appear quite different from a business and technical perspective, they share a lot under the surface. In fact, both would be easier—and cheaper—to achieve with a common infrastructure—what we call an identity and context service. Read this white paper to find out more.
Smart Enterprise Single Sign-on (ESSO)
The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky
4.2. Integration with Existing Identity Management Solutions In addition to the seamless integration in heterogeneous IT landscapes, Secure SignOn also integrates easily into existing Identity Management Systems. As the identity management system assigns the proper roles and privileges, the employee is also provisioned for strong authentication and Single Sign-On. When the users signs on to the network with or without a security device he can only access those defined systems, resources, and applications
Aurionpro’s SCMProfit for the Logistics Industry
Technology Evaluation Centers (TEC) had the occasion recently to speak with Aurionpro Solutions’ president of supply chain management (SCM), Atul Kaushal, and
an Oracle partner for identity and access management. Aurionpro’s focus in the supply chain area is its SCMProfit solution, targeted to freight forwarders and third-party logistics providers (3PLs), providing “visibility, control, collaboration, and execution” from order fulfillment through to logistics execution. The solution is built on the Microsoft dot.net/SQL Server platform, and Aurionpro is rolling out a Microsoft Azure –based version. TEC will be taking a closer look at Aurionpro in
The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its
Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the signin process. The widespread use and misuse of
Radiant Logic, Inc. is the market-leading provider of Identity and Context Virtualization solutions. Since pioneering the first virtual directory, Radiant
the market-leading provider of Identity and Context Virtualization solutions. Since pioneering the first virtual directory, Radiant Logic has evolved its groundbreaking technology into an enterprise-grade solution, enabling Fortune 1000 companies around the world to solve their toughest identity and data management challenges.
Best Practices for User Provisioning Management
Organizations need to control who has access to enterprise resources, what level of access individuals have, and who is authorized to grant access. But you may
may not know that identity management involves more than your organization s operations side—you must also align your infrastructure to maximize security. Find out key considerations and best practices for developing a user provisioning and access management strategy.
The Interview: Having an Experience with Joe Pine
Today''s business climate is all about competition - we''re lean, we’re mean, but competing on price is not where it’s at. How do you create a lasting identity
b2b supply chain,business supply chain,chain execution,closed loop supply chain,define supply chain management,definition of supply chain management,demand driven supply chain,demand management supply chain,demand planning,demand supply chain,effective supply chain management,efficient supply chain,erp supply chain,financial supply chain,global supply chain
Features and Functions
White Paper Newsletters