user provisioning

Results 26 - 45 of 45Sort Results By: Published Date | Title | Company Name
By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
     OneLogin
By: OneLogin     Published Date: Oct 24, 2017
Innovative Identity and Access Management That Actually Makes Life Easier Empower employees, customers and partners with secure access to cloud and company apps on any device. Transform your enterprise security and centralize control of users and apps. OneLogin’s cloud identity management platform provides secure single sign-on, multi-factor authentication, directory integration with AD, LDAP and other external directories, user provisioning, endpoint management and more.
Tags : 
     OneLogin
By: NetIQ     Published Date: Nov 05, 2012
User administration solutions manage identities and their attributes across systems, applications and resources. Buyers seek to demonstrate regulatory compliance while reducing project deployment times and costs.
Tags : iam, identity and access management, iam initiatives, security compliance, security
     NetIQ
By: F5 Networks Inc     Published Date: Jan 21, 2014
Information technology is at a crucial turning point. Enterprise IT departments are under constant pressure to meet user and application demands, aware that cloud deployments offer an easier and faster alternative but often pinned down by legacy deployment models. The problem stems from the inability of those legacy models to adapt to meet expectations for rapid provisioning, continuous delivery, and consistent performance across multiple environments. Read this whitepaper to learn more about the evolution of application delivery and the services your enterprise can utilize to successfully manage the increased pressure on network and application infrastructure.
Tags : f5 networks, f5 software, software defined application services, application services, application layer, application delivery, cloud, deployment
     F5 Networks Inc
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
     VMware SD-WAN by VeloCloud
By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
This white paper explains how you can unleash the full potential of mobility - greater productivity, flexibility, and better economics - by unifying secure device access, user authentication, provisioning, and management.
Tags : byod, bring your own device, it infrastructure, mobile workforce, mobility
     HP OMG Mobile Workforce
By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional databases and data warehouses are evolving to capture new data types and spread their capabilities in a hybrid cloud architecture, allowing business users to get the same results regardless of where the data resides. The details of the underlying infrastructure become invisible. Self-managing data lakes automate the provisioning, reliability, performance and cost, enabling data access and experimentation.
Tags : 
     AWS - ROI DNA
By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa
     NetIQ
By: CDW     Published Date: Apr 04, 2016
Self-service is an advanced element of private cloud environments that improves management efficiency and business agility, as well as lowering operating expenses. A self-service environment streamlines the interaction between users and the IT department. It empowers internal consumers of IT services to request and receive appropriately configured resources on demand with minimal IT intervention. NetApp® OnCommand® Workflow Automation, the NetApp Management SDK with open APIs, and key ecosystem partnerships enable enterprises to easily integrate their orchestration solutions and custom management tools with the NetApp storage service catalog for automated storage provisioning and protection. Customers can thereby create a self-service, web-based portal that efficiently delivers IT as a service to virtualization administrators, application administrators, and users, while enabling IT staff to focus on higher value activities.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
     CDW
By: CDW - NetApp     Published Date: Apr 07, 2016
Self-service is an advanced element of private cloud environments that improves management efficiency and business agility, as well as lowering operating expenses. A self-service environment streamlines the interaction between users and the IT department. It empowers internal consumers of IT services to request and receive appropriately configured resources on demand with minimal IT intervention. NetApp® OnCommand® Workflow Automation, the NetApp Management SDK with open APIs, and key ecosystem partnerships enable enterprises to easily integrate their orchestration solutions and custom management tools with the NetApp storage service catalog for automated storage provisioning and protection. Customers can thereby create a self-service, web-based portal that efficiently delivers IT as a service to virtualization administrators, application administrators, and users, while enabling IT staff to focus on higher value activities.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
     CDW - NetApp
By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
     OKTA
By: IDFocus     Published Date: Aug 21, 2009
HRFeed is one of the most critical elements of every Identity Management or User Provisioning solution. This document outlines the different business and technical challenges that IDFocus faced when building successful HR-to-Provisioning integration for several clients.
Tags : identity management, human resources, hrfeed, identity management, user provisioning, system integration, idfocus
     IDFocus
By: IDFocus     Published Date: Aug 21, 2009
This whitepaper discusses the user provisioning challenges and is a tool for companies evaluating such a solution to have a clearer, more structured evaluation process. This document focuses on how to evaluate and analyze the components delivered by a user provisioning solution.
Tags : password management, provisioning, user provisioning, idfocus, id focus
     IDFocus
By: Imprivata     Published Date: Nov 27, 2007
Increased pressure for cost-efficient administration, productive work environments and an array of strict government regulations are driving increased demand for integrated user Provisioning/SSO solutions that are affordable, easy to maintain and secure.
Tags : sso, single sign on, user management, authentication, identity management, imprivata, ppi, security
     Imprivata
By: Hitachi ID Systems, Inc.     Published Date: Oct 20, 2010
This document defines the components of identity management
Tags : identity management, user provisioning, entitlements, password management, rbac
     Hitachi ID Systems, Inc.
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how you can unleash the full potential of mobility-greater productivity, flexibility, and better economics-by unifying secure device access, user authentication, provisioning, and management.
Tags : holistic approach, byod, business advantage, intel, convenience, it infrastructure, byod, bring your own device
     Sponsored by HP and Intel®
Previous    1 2     Next   
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com