According to a recent study by IDG Research Services, personalization is recognized as a key differentiator among online businesses, for both e-commerce and non-commerce sites....
Sponsor: Neustar, Inc.
In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge...
Sponsor: Bit9, Inc
Identifying and understanding the wide range of information security and privacy laws and regulations can be a complex task for any organization. In many instances, these laws and...
Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can carry a steep financial cost, damage a business's reputation, and even lead to criminal prosecution, because of complex and frequently changing regulations. This white paper examines the challenges organizations face and the steps they can take to protect themselves and their customers against data breaches and ensure the safety of this sensitive information.
Now that employees are leaving the relative safety of the firewall to use online SaaS applications, enterprises need to adjust the way they manage employee identities. This White Paper from Ping Identity addresses why we need to centralize employees' IDs across applications.
SAML (Security Assertion Markup Language) is the predominant industry standard that enables Internet Single Sign-On (SSO). This White Paper discusses what SAML is and how it works.
The rise of online Software-as-a-Service (SaaS) applications has increased the importance of eliminating multiple logins and passwords within the Enterprise via Single Sign-On (SSO). This White Paper from Ping Identity explains what SSO is and how it works.
The Sarbanes-Oxley Act of 2002 has had a profound effect on businesses. This paper offers an overview of the act and its implications, reviews the role of identity and access management (IAM) in meeting the requirements, and highlights IAM products and services available from Sun.
A virtual directory presents a single, consolidated view of disparate identity data to organizations dealing with diverse legacy resources as a result of ongoing growth, mergers and acquisitions, or collaboration with other organizations.