This white paper describes the case of a retail company which implements centralized, shared and safely accessible services by its subsidiaries, its different establishments or shops without however creating administration overload.
Drawing on 15 years of experience, this white paper describes how to efficiently deploy identity and access management in any organization.
This document presents a simple yet effective solution for solving the issue of multiple overlapping user directories.
This white paper describes how to involve business managers in defining and approving the security policy, and which tasks to delegate.
This white paper describes an all-in-one solution for LDAP directory, LDAP high availability, LDAP scalability and metadirectory.
This white paper describes how to implement security compliance with identity intelligence and how to audit security with security reports.
This white paper provides a panorama of enterprise SSO functions on the market today.
Illustrated with real-life examples, this white paper describes the best practices of single sign-on (SSO) projects.
Salespersons can automatically access all CRM applications thanks to the SSO (Single Sign-On) engine installed on the workstations.
In a 'Customer Call Center', the intensive use of workstations to access different customers' data gives a special dimension to the introduction of SSO.
This white paper describes the most-used strong authentication methods, with their peculiarities.
Why Authentication and access control should not be handled by Web applications?
You need to protect access by your mobile users?
This document describes a secure single sign-on (SSO) solution for accessing Microsoft Exchange on tablets and smartphones.
Want to implement SAML-SSO access management for traditional and J2EE applications?
This high availability white paper develops SafeKit software features for clustering a critical application with a software-only solution (network load balancing, synchronous real-time replication and automatic failover).
This HA guide is illustrated with a real-life crisis situation. It helps you ask the right questions and provides guidelines for choosing a high availability solution.
In this KuppingerCole report, discover why the Nantes university hospital was awarded for its innovative approach in identity and access management (IAM) with Evidian.
According to KuppingerCole : “Evidian is well-known for its leading-edge Enterprise SSO offerings, but also has a strong offering for other areas of IAM/IAG. Most features are tightly integrated into the platform […] That makes the Evidian offering also a good choice for medium-sized businesses.”
According to KuppingerCole : “Evidian is highly experienced in providing smooth, proven, secure solutions for E-SSO. […] Evidian is among the clear Leaders in the E-SSO market segment and a logical pick for shortlists in that area”
KuppingerCole, a leading independent Germany-based analyst firm, evaluates in detail Evidian's Identity & Access Manager software in this 7-page document.
Some of the most severe financial losses in 2008 were caused by insufficient operational risk procedures-despite the awareness provided by the Basel II agreement.
Do you need to understand the impact of laws and regulations on your identity and access management infrastructure?
This white paper describes how an integrated identity and access management (IAM) solution can help you comply with many areas of the Payment Card Industry Data Security Standard (PCI DSS).
Identity and access management can help you enforce internal controls cost-effectively.
Do you need to implement IT SOX reports demonstrating the effectiveness of the implementation of your IT access policy?
Basel III Compliance - The contribution of identity and access management.
On the basis of Evidian's customer experience, this white paper describes how IT departments control internal risks linked to improper accesses.
This white paper addresses the issues to consider while setting up an SSO within a hospital, with authentication based on the Connecting for Health (CfH) card.
How a large regional hospital protects its IT accesses with smart cards, ensuring confidentiality and efficiency.
Achieving regulatory compliance with the HIPAA Security Rule.
How to help hospital staff and doctors be more productive? Learn how UK hospitals implement single sign-on.
The prescription for identity and access management headaches"
Can you improve the Quality of Service of your applications?
How to implement focus on correlation techniques that enable the management of business-critical IT services.
Service management intelligence for IT and telecom service assurance