We are sorry, the event "POSTPONED UNTIL FURTHER NOTICE Identity Management: solving the problem in Higher Education" has already expired.
This document describes the security features of One Identity Manager, including access control, protection of customer data and secure network communication.
Here are eight key practices, gleaned from years of experience and informed by this key insight, that will help you improve your identity management system to ensure better security, efficiency and compliance.
Learn how you can use PingFederate to authenticate users into the Identity Manager Web Portal
IT disasters are unpredictable and inevitable. Disaster recovery, however, should be planned, predictable and controlled. IDC data shows nearly 50% of enterprises across APEJ will revamp their BCP or BCDR for future pandemic/crisis as a result of the COVID-19 Pandemic. So, how can you make sure that you’re ready for any future crisis?Register for this live webcast and join Cathy Huang from IDC and Eddie Ho from Quest Software as they explore common ca
Learn how you can use PingFederate to authenticate users into the Identity Manager 8.0.2+ Web Portal
Learn how to streamline your organization's application lifecycle management from deployment with Identity Manager Application Governance Module.
Most of the challenges we face with security, and IAM in particular, are based on the diversity of the systems that must be controlled
With the recent rapid adoption of Office 365 and increased rate of M&A activity, many of your customers are dealing with multiple Office 365 tenants running a variety of workloads including Exchange, One Drive, SharePoint and Teams. And to facilitate the M&A, it’s important to consolidate these multiple tenants to reduce costs and complexity. Join Quest subject matter expert Daniel Sjogren to get the latest updates how to perform smooth and efficient