daas

Results 51 - 74 of 74Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Adopting Identity as a Service (IDaaS), also known as Cloud IAM, can reduce your IT costs, but how do you convince your organization to take the leap? Use this TCO guide to compare the cost of on-premises and cloud-based IAM, such as IBM Cloud Identity Service. Then, calculate your three-year cost savings to truly “wow” your team.
Tags : 
iam, total cost of ownership, cloud based identity, access management, idaas
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : 
idaas, cloud based identity, access management, iam, identity governance functionality
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Mar 26, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : 
identity management, idaas, cloud applications, ibm cloud identity
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Learn why Ovum positions IBM Cloud Identity Service on the top of the leader board in the most recent worldwide IDaaS report.
Tags : 
idaas solution, ibm cloud identity service, worldwide idaas report, ovum
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
This IDaaS checklist will help you determine whether IBM Cloud Identity Service is right for you. Chances are - it is!
Tags : 
idaas, ibm cloud identity service, security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Mar 23, 2018
The focus of this book is learning what IDaaS provides, why it benefits organizations, and how to implement it for your applications.
Tags : 
cloud, idaas, application
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Apr 23, 2018
To assist IAM leaders with their IDaaS vendor selection process, Gartner evaluated 18 vendors' services in this research using 11 critical capabilities and three common use cases: workforce to SaaS, business-to-consumer and traditional/legacy workforce.
Tags : 
idaas, ibm cloud identity service
    
IBM
Published By: IBM     Published Date: Apr 23, 2018
IBM Cloud Identity Service is helping businesses simplify Identity and Access Management (IAM) through a cloud-delivered service (IDaaS). IBM Cloud Identity Service combines the full spectrum of IAM, including federation, web access management, and identity governance with the speed, agility, and lower cost of the cloud. This video demonstrates how to rapidly integrate SaaS and other third-party applications using the "Quick Connect" feature within the IBM Cloud Identity Service and securely connect people and applications to the cloud.
Tags : 
idaas, ibm cloud identity service
    
IBM
Published By: StrikeIron     Published Date: Oct 03, 2013
Learn how to increase your landing page conversion rate by 10-30% using data validation, which will help you to get the most out of your landing page optimization.
Tags : 
strikeiron, data quality, data validation, data, daas, data-as-a-service, landing page optimizations, cloud-based, cloud, landing page conversion rates
    
StrikeIron
Published By: IBM     Published Date: Oct 20, 2016
Adopting Identity as a Service (IDaaS), also known as Cloud IAM, can reduce your IT costs, but how do you convince your organization to take the leap? Use this TCO guide to compare the cost of on-premises and cloud-based IAM, such as IBM Cloud Identity Service. Then, calculate your three-year cost savings to truly "wow" your team.
Tags : 
ibm, security, ciso, cloud iam, identity service device, idaas
    
IBM
Published By: Emerson Network Power     Published Date: Dec 14, 2010
Learn best practices for optimizing critical systems for cloud deployment in existing facilities, including optimizing power architectures for high availability.
Tags : 
emerson network power, liebert, dcim, data center infrastructure management, cloud computing, paas, iaas, saas, daas, high availability, business continuity
    
Emerson Network Power
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, business intelligence
    
Bitium
Published By: Okta     Published Date: Jun 15, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
magic quadrant
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
mobile, apps, mobile apps, s&r, fraud, okta
    
Okta
Published By: Delphix     Published Date: Apr 14, 2015
Current test data management solutions are flawed in at least one key dimension. Technologies in the emerging Data as a Service (DaaS) category bring the benefits of virtualization to application data, delivering high-quality test data with both speed and efficiency.
Tags : 
    
Delphix
Published By: Delphix     Published Date: Apr 14, 2015
ERP upgrades are necessary, but they too often exceed budget and schedule. Technologies in the emerging Data as a Service (DaaS) category promise to accelerate data delivery and reduce infrastructure requirements. DaaS eliminates time, cost, and risk associated with these business-critical projects.
Tags : 
    
Delphix
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : 
ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
    
JumpCloud
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : 
ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, aws, cloud servers, iaas
    
JumpCloud
Published By: Okta     Published Date: Oct 30, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas
    
Okta
Published By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: IBM     Published Date: Oct 26, 2017
When choosing among providers of identity and access management as a service (IDaaS), a great place to start is evaluating your own organization’s IAM needs. Create a personalized list of your identity and access management (IAM) needs and determine if IBM® Cloud Identity Service is right for you. With this checklist, you will be able to determine if your needs match up with the benefits of IBM Cloud Identity Service.
Tags : 
iam, idaas, web access management, cloud based security, governance administration, enterprise grade identity
    
IBM
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.