collect the videos you love
collect | share | explore
Tag results for identity
sort by: relevance | recent
Results from BuzzFeed (3 out of 5)
on the internet nobody knows you039re a dog

quoton the internet nobody knows you039re a dogquot is a popular saying used to describe the anonymity of the internetit began as the caption of a car
i039m an atheist but i039m not

im atheist but that doesnt mean im being disrespectful when i ask the question 039why039
7 struggles of having a common name

quotwe already got a mike we can039t call you mikequot
Results from all user's collections (238 out of ~238)
identity thief picks wrong guy - video

fox 4 reporter confronts woman accused of stealing his identity
building a business case for your identity management project: part 3 of 3

http:hitachi-idcomiain chapman and bruce macdonald provided insight into: building the idm business case planning implementation phases and preparing for implementationto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=part-3-of-3-deploymentwmv
building a business case for your identity management project: part 2 of 3

http:hitachi-idcomiain chapman and bruce macdonald provided insight into: building the idm business case planning implementation phases and preparing for implementationto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=part-2of3-implementing_the_idm_projectwmv
authentication management the evolution of password management beyond password syncreset

http:hitachi-idcomplease join hitachi id systems039 cto idan shoham for a discussion on authentication management: the evolution of password management beyond password synchronization and resetto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=authentication_management_the_evolution_of_password_management_beyond_password_synchronization_and_resetwmv
authentication management with hitachi id password manager

http:hitachi-idcomin this session hitachi id systems039 cto idan shoham and gartner039s research director identity and privacy mark diodati discuss the evolution from simple self-service password reset applications to enterprise solutions that manage every authentication factor for every user the webinar also focuses on how passwords security questions one-time password tokens smart cards pki certificates biometrics and full disk encryption products can be managed and supported togetherto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=authentication_management-gartner-telus-hitachiidwmv
reduce it support calls with identity automation

http:hitachi-idcomview our webinar from thursday april 14 2011 at 11:00 am mt 1:00 pm et 10:00 am pt where we discussed how help desk and it support professionals can benefit from hitachi id identity management productsthis webinar offered solutions to common help desk challenges including:- making self-service accessible from any device anywhere- using automation to reduce problem frequency- tackling the most common authentication and access problemsto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=reducing_support_calls_with_identity_automationwmv
identity management: a project or a program

http:hitachi-idcomidentity management: a project or a programview our webinar from thursday may 26th 11am mt 10am pt 1pm et for a webinar on identity management: a project or a programin this webinar we discussed why an iam system should be managed as a long-term program rather than a one-shot deployment project the webinar covered where iam fits in an organization why it should be permanently staffed and how to develop a business case to fund a long-running programto download the complete webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=identityaccessmanagement-project_or_programwmv
violations of segregation of duties rules

http:hitachi-idcomviolations of segregation of duties rulescontent: finds users who violate any segregation of duties sod rule finds users whose violation of an sod rule has been approvedkey concepts: sod reports are a detective control -- ie they find already-existing violations there is also a preventive control embedded in the change request workflow sod violations may be approved for example if they are a legitimate situation that the policy did not take into accountsee more at: http:hitachi-idcomidentity-manageroverviewreportshtml
orphan and dormant accounts

http:hitachi-idcomorphan and dormant accountscontent: shows accounts with no known ownerkey concepts: built-in reports make it easy to find orphan and dormant accounts: orphan users are user profiles with no login accounts orphan accounts have no known owner dormant accounts have had no recent login activity dormant profiles have all-dormant accountssee more at: http:hitachi-idcomidentity-manageroverviewreportshtml
identity and access management in higher education

http:hitachi-idcomjoin hitachi id systems for an online discussion of the unique challenges the higher education community faces when implementing an identity management program:privacy user provisioningde-provisioning cost savings roiwe will review best practices around: access control authentication password management compliancesee more at: http:hitachi-idcomaboutusnewsarchived-webinarshtml
outsourced idm administrator service

http:hitachi-idcomzvjezdan patz manager technical support will host an introductory session on hitachi id039s new outsourced idm administrator servicesee more at: http:hitachi-idcomaboutusnewsarchived-webinarshtml
the role of relationships in identity and access management

http:hitachi-idcomview our webinar from tuesday august 27th 1:00 pmet 11:00 am mt 10:00 am pt when we discussed the role of relationships in identity and access managementtraditionally user rights inside iam systems have been expressed using organizational hierarchies this model does not fit well with real-world requirements howeverin this presentation we will introduce a more robust model for iam security: relationships between users relationships are a better foundation for a variety of security controls inside the iam system ranging from privacy protection to approvals workflowssee more at: http:hitachi-idcomaboutusnewsarchived-webinarshtml
building a business case for your idm project part 1 of 3

http:hitachi-idcomiain chapman and bruce macdonald provided insight into: building the idm business case planning implementation phases and preparing for implementationsee more at: http:hitachi-idcomaboutusnewsarchived-webinarshtml
hp journey

this film follows the moving brands assess and define process as documented on the project blog it shows the journey of stakeholder workshops the brand market and competitor audits and trend reports the development and definition of the brand story and characters and ultimately the creative vision for the hp marksee more at: http:wwwmovingbrandscomcategory_name=hp-work
orphan and dormant accounts

http:hitachi-idcomorphan and dormant accountscontent: shows accounts with no known ownerkey concepts: built-in reports make it easy to find orphan and dormant accounts: orphan users are user profiles with no login accounts orphan accounts have no known owner dormant accounts have had no recent login activity dormant profiles have all-dormant accountssee more at: http:hitachi-idcomidentity-manageroverviewreportshtml