Identity management

Results: 13318



#Item
31Global Federated Identity and Privilege Management (GFIPM)Task Team

Global Federated Identity and Privilege Management (GFIPM)Task Team

Add to Reading List

Source URL: it.ojp.gov

- Date: 2016-01-27 08:29:08
    32

    Identity – Authentication Management Identity Management is a centrally controlled enterprise capability used at all echelons (via standard policy enforcement points that leverage Army Knowledge Online, Common-Access

    Add to Reading List

    Source URL: netcom.army.mil

    - Date: 2009-10-26 18:13:04
      33

      Founded in 1989, MicroStrategy is a leading worldwide provider of enterprise software platforms. Our mission is to provide the most flexible, powerful, scalable, and user-friendly analytics and identity management platfo

      Add to Reading List

      Source URL: praca.wwsi.edu.pl

      - Date: 2016-05-30 10:58:18
        34Identity Management/Active Directory Roadmap, May 2011

        Identity Management/Active Directory Roadmap, May 2011

        Add to Reading List

        Source URL: cio.unm.edu

        - Date: 2013-09-25 13:30:37
          35NOTICE TO APPLICANTS FOR COURSES FY 2013 and future NFA OR EMI COURSES To reduce the risk of identity theft, FEMA, the National Fire Academy (NFA), and the Emergency Management Institute (EMI) are eliminating the use of

          NOTICE TO APPLICANTS FOR COURSES FY 2013 and future NFA OR EMI COURSES To reduce the risk of identity theft, FEMA, the National Fire Academy (NFA), and the Emergency Management Institute (EMI) are eliminating the use of

          Add to Reading List

          Source URL: www.owrb.ok.gov

          - Date: 2015-02-18 12:41:29
            36

            PDF Document

            Add to Reading List

            Source URL: its.sjsu.edu

            Language: English - Date: 2015-12-07 11:37:15
            37Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

            Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2006-06-02 15:04:21
            38PRODUCT SUPPORT DATASHEET  Support One Solution to Protect Them All Execute your next identity and access management deployment with confidence knowing that ForgeRock Product Support is close at hand throughout the proje

            PRODUCT SUPPORT DATASHEET Support One Solution to Protect Them All Execute your next identity and access management deployment with confidence knowing that ForgeRock Product Support is close at hand throughout the proje

            Add to Reading List

            Source URL: www.forgerock.com

            Language: English - Date: 2015-06-10 14:58:36
            39UNITED STATES DEPARTMENT OF COMMERCE Chief Financial Officer and Assistant Secretary for Administration Washington, D.CNOV

            UNITED STATES DEPARTMENT OF COMMERCE Chief Financial Officer and Assistant Secretary for Administration Washington, D.CNOV

            Add to Reading List

            Source URL: cio.noaa.gov

            Language: English - Date: 2015-09-25 15:57:53
            40ITAC SPEAKING NOTES FOR THE OCED PRIVACY CONFERENCE IN ISRAELOCTOBER 2010 PANEL IV – FOSTERING INNOVATION IN PRIVACY PROTECTION “This session will examine some innovative approaches being taken by organisation

            ITAC SPEAKING NOTES FOR THE OCED PRIVACY CONFERENCE IN ISRAELOCTOBER 2010 PANEL IV – FOSTERING INNOVATION IN PRIVACY PROTECTION “This session will examine some innovative approaches being taken by organisation

            Add to Reading List

            Source URL: www.internetac.org

            Language: English - Date: 2014-04-23 18:14:13