MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 20, 2008
Larry Barrett
Can Oracle's Identity Manager Tackle Compliance? Oracle on Wednesday announced the release of the latest version of its Identity Manager software, a key security and access management component of its Fusion middleware platform. mark for My Articles similar articles
Knowledge@Wharton Exploring the Links between Brand Name and Consumer Identity A successful identity-oriented marketing strategy like Nike's consists of three critical links, including the consumer, the identity and the brand. mark for My Articles similar articles
CRM
December 2013
Ray Wang
Why the Battle for Identity Will Affect Customer Experience Merging identities across environments is no easy task. Facebook, Google, and Twitter dominate most social log-ins. Users expect their identity to be transportable from personal to work environments. These implications carry over to customer experience. mark for My Articles similar articles
Knowledge@Wharton Family Matters: Are Fords, Hewletts and Packards Right to Exercise Their Clout? Are these founding-family members being too intrusive, wrecking the well-laid plans of professional managers and meddling in affairs that are none of their business? mark for My Articles similar articles
InternetNews
May 20, 2010
Novell Offers Cloud-Based Identity Manager With this new release, Novell's identity management tools/framework cover the move of services and identity floating in the clouds, and more tools for access and security on the way. mark for My Articles similar articles
CIO
October 15, 2003
Ben Worthen
Identity Crisis Identity management projects promise big returns, but be prepared for long, complex implementations. mark for My Articles similar articles
CIO
January 1, 2003
Alison Bass
Identity Crisis If identity theft isn't already on your radar screen, this headline will put it there: 13,000 Credit Reports Stolen by Hackers. To avoid a similar disaster on their turf, CIOs should insist their company's customer data be kept in separate databases protected by a number of different security measures. mark for My Articles similar articles
PC Magazine
October 28, 2003
Sebastian Rupley
Lock 'Em Out Take steps to protect yourself from identity theft. mark for My Articles similar articles
InternetNews
June 13, 2006
Sean Michael Kerner
Novell Lets Bandit Loose The Bandit project is an open source effort led by Novell that aims to integrate disparate identity standards and projects in an effort to help create an identity system that spans the Internet. mark for My Articles similar articles
The Motley Fool
December 30, 2004
Types of Identity Theft Learn what to look out for, and protect yourself! mark for My Articles similar articles
InternetNews
February 12, 2010
Study Puts Identity Theft Cost at $54B in 2009 Research firm Javelin estimates that more than 11 million Americans were victims of identity theft last year, a 12 percent increase that led to tens of billions of dollars in costs. mark for My Articles similar articles
InternetNews
February 27, 2006
Clint Boulton
Manage Your Own Identity Online Companies like Microsoft join Harvard in the Higgins Project, which is designed to help people control their identity info online. mark for My Articles similar articles
AskMen.com
Branden Peters
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. mark for My Articles similar articles
Bank Systems & Technology
February 1, 2007
Gary Greenwald
Securing Internet Transactions Is a Top Concern at Banks Beyond the regulatory reasons driving improvements in Internet banking security, banks are also uniquely positioned to play a critical role in the broader identity management arena. mark for My Articles similar articles
Information Today
September 23, 2014
LexisNexis Introduces Identity Challenges Resource LexisNexis Risk Solutions created a thought leadership platform to educate government agencies and officials about solutions to their identity challenges. mark for My Articles similar articles
InternetNews
June 20, 2005
Clint Boulton
Single Sign-On, The Java Way Sun's latest ID management products are designed to allow rights provisioning for partner users. mark for My Articles similar articles
Search Engine Watch
March 22, 2010
Eli Goodman
The Relaunch of Syfy: When Search Shapes the Brand Was this rebranding strategy a success from a search perspective? Let's dig into the data and evaluate exactly what happened. mark for My Articles similar articles
Inc.
August 2003
Robert X. Cringely
They've Got Your Number Identity theft using a combination of computer technology and government information is a major crime just waiting to happen. mark for My Articles similar articles
InternetNews
January 24, 2005
Clint Boulton
Sun ID Software Takes to the Audit Trail The systems vendor pads its ID management portfolio with a compliance-oriented software package. mark for My Articles similar articles
Entrepreneur
August 2007
Jacquelyn Lynn
Small Business Owners Risk Identity Theft Insuring your identity makes it easier to get it back. mark for My Articles similar articles
InternetNews
March 31, 2010
FBI, DOJ Identity Theft Programs Fall Short A new report from the DOJ's Office of the Inspector General says the government is making a big mistake by not making ID theft prevention and prosecution a top priority. mark for My Articles similar articles
InternetNews
July 23, 2010
Oracle Offers New Identity Management Suite Oracle Identity Management 11g is designed to "radically" simplify application security. mark for My Articles similar articles
PC Magazine
July 1, 2003
Neil J. Rubenking
Password-Protect the Outlook Express In-Box Is there a way to make the Outlook Express in-box private, using a password? mark for My Articles similar articles
InternetNews
July 19, 2007
Roy Mark
DoJ Sends ID Theft Bill to Congress The Bush administration sent proposed legislation to Congress today that aims to update and improve federal identity theft laws. mark for My Articles similar articles
InternetNews
December 20, 2005
Clint Boulton
Oracle Tops Off ID Management Suite With its past year's acquisitions fully integrated, Oracle proudly releases its Identity and Access Management Suite to help corporations address security concerns. mark for My Articles similar articles
InternetNews
August 9, 2006
Michael Hickins
Novell's Sentinel Watches Over Your Network Novell incorporates the Sentinel security perks from its e-Security purchase. mark for My Articles similar articles
InternetNews
May 24, 2005
Erin Joyce
Microsoft Moving From Passport to InfoCard Microsoft releases its latest Web services platform, offering an olive branch on interoperable identity management to partners. mark for My Articles similar articles
InternetNews
May 12, 2010
ForgeRock Extending Sun's OpenSSO Platform With a gaggle of Sun veterans on staff, ForgeRock is looking to expand the OpenSSO single sign-on and identity management platform, rebranded as OpenAM. mark for My Articles similar articles
InternetNews
January 12, 2009
Richard Adhikari
Vendors See More DLP with ID Management CA's recent acquisition is a sign of more product adds to come. mark for My Articles similar articles
InternetNews
October 27, 2005
David Needle
Sun Looks to Capitalize on 'Perfect Storm' Sun Microsystems is quickly establishing itself as a leader in identity management solutions. mark for My Articles similar articles
InternetNews
April 23, 2007
Roy Mark
A New Fight Against ID Theft Improved cyber security, increased law enforcement and public education top the recommendations of President Bush's Identity Theft Task Force plan issued today. mark for My Articles similar articles
T.H.E. Journal
March 1, 2010
Charlene O'Hanlon
Identity Scramble An identity management system can catch potential mistakes that could put your district at risk. mark for My Articles similar articles
InternetNews
November 16, 2005
Clint Boulton
Oracle Dual Buy Plugs ID Holes Oracle made a bid to make its identity management portfolio the strongest of its rivals, acquiring privately held specialists Thor Technologies and OctetString for an undisclosed sum. mark for My Articles similar articles
Wall Street & Technology
April 14, 2006
Identity Fraud Is Finding Fewer U.S. Victims Despite a rise in phishing activity and the increased regularity of reported data breaches, instances of identity fraud in the United States actually decreased in 2005. mark for My Articles similar articles
Bank Systems & Technology
March 7, 2005
George Hulme
May I See Some ID, Please? Identity theft continues to be consumers' top complaint, and ID theft-related complaints are on the rise. Bank-related identity theft comprised 18 percent of all ID theft complaints. mark for My Articles similar articles
Fast Company
Neal Ungerleider
MasterCard: Retailers Can Use "Pay-By-Selfie" Starting 2016 MasterCard is rolling out a "Pay By Selfie" feature that allows retailers to verify an online shopper's identity using a photo of their face. mark for My Articles similar articles
Bank Technology News
January 2008
Michael Dumiak
Database: What's In a Name? To hear independent analysts and software vendors tell it, the quality of data is getting worse. Isolating, cleaning up and keeping accurate records is much more difficult than current bank identity management systems can handle. mark for My Articles similar articles
Bank Systems & Technology
July 12, 2007
Larry Greenemeier
Link Between Data Breaches And ID Theft Unclear, GAO Reports A U.S. Government Accountability Office report indicates that while the amount of information lost or stolen is disturbing, it's difficult to prove that these breaches lead to identity theft. mark for My Articles similar articles
Bank Technology News
January 2003
Mark Bruno
A New Breed Of Criminals Identity heists could drain $500 million this year. Staying ahead of the thieves may be the only way to curb the rise of identity thefts. mark for My Articles similar articles
PC Magazine
May 1, 2009
Matthew D. Sarrel
Identity Theft: It's Out of Your Hands The most important thing you have is you, right? And online, you are your identity. If xyz.com doesn't value you enough to keep you safe, then does that company really deserve your business? mark for My Articles similar articles
PC Magazine
November 30, 2004
Neil J. Rubenking
Closing a Hole in OE Identity Protection The mail client in Windows 9x versions can leave your correspondence unprotected. mark for My Articles similar articles
Fast Company
April 2000
Keith H. Hammonds
Grassroots Leadership - Ford Motor Company "We want people at all levels who will take risks and who can make decisions." mark for My Articles similar articles
InternetNews
February 16, 2006
Tim Scannell
IBM Takes Holistic Security Stance IBM Corp. this week restructured nearly its entire portfolio of security products and services to provide a more strategic and proactive approach to protecting computer systems and users from abuse, unauthorized access and identity theft. mark for My Articles similar articles
InternetNews
July 15, 2004
Roy Mark
Identity Theft Law Hits Back at 'Phishers' The Identity Theft Penalty Enhancement Act, signed into law by President Bush, mandates federal prison terms for using a false identity in the commission of a felony. mark for My Articles similar articles
InternetNews
August 9, 2010
Microsoft Adds Single Sign-On to Azure The latest update to Microsoft's Azure AppFabric cloud-computing platform includes support for a harmonized online identity with single sign-on support for multiple credential providers. mark for My Articles similar articles
InternetNews
June 1, 2004
Jim Wagner
Sun Consolidates ID Management Systems With the help of its WaveSet assets, Sun looks to stay ahead of the ID Management pack with a combo of user provisioning and meta-directory features. mark for My Articles similar articles
Bank Technology News
December 2003
John Adams
By the Numbers Identity fraud should be a top-five business priority for line-of-business decision-makers at retail financial institutions. Growth rates are indeed troublesome. mark for My Articles similar articles
InternetNews
June 24, 2005
Clint Boulton
BMC Integrates Goods For ID Ease The management software maker released a suite that enables single sign-on access and user provisioning. mark for My Articles similar articles
PC World
October 2002
Anne Kandra
Don't Let Them Steal Your Good Name Identity theft is skyrocketing -- and it's even being used to fund terrorism. The Web can be a real boon for identity thieves, helping them find information about victims and profit from the crime. mark for My Articles similar articles
HBS Working Knowledge
June 20, 2005
Mallory Stark
Creating a Positive Professional Image As Harvard professor Laura Morgan Roberts sees it, if you aren't managing your own professional image, others are. Here are strategies to take a proactive approach to managing your image. mark for My Articles similar articles