<
>

Posts in Identity & Access

SailPoint and Okta Partner to Deliver End-to-End Identity for the Enterprise

SailPoint Technologies Holdings, Inc. and Okta, Inc., today announced a strategic partnership to provide end-to-end identity for the enterprise – helping organizations balance providing simple,...

Hitachi ID Systems Releases Milestone Version of Identity and Access Management Suite

Hitachi ID Systems is pleased to announce the release of a major version (11.0) of its Identity and Access Management Suite. The 11.0 release introduces group lifecycle management across integrated...

BeyondTrust Introduces First-of-its Kind Solution to Protect Critical Network, IoT, ICS, and SCADA Devices from Privilege-based Attacks

BeyondTrust, today announced a first-of-its kind privilege management solution for network, IoT, ICS, and SCADA devices. PowerBroker for Networks rounds out BeyondTrust’s privilege management...

Taipei Partners With IOTA To Become A Blockchain-Powered Smart City

Taipei, Taiwan is seeking to become a smart city by utilizing the power of Distributed Ledger Technology (DLT), or Blockchain. The city has chosen to partner with IOTA, the inventors of the so-called...

McAfee® Identity Theft Protection Helps Deliver Peace of Mind to Consumers in the Face of Mounting Data Breaches

As widespread data breaches continue to make headlines and consumers become more vigilant around security and privacy, cybersecurity leader McAfee today announced McAfee Identity Theft Protection,...

KuppingerCole on PowerBroker for Unix & Linux: “Mature, feature-rich, and with new innovations being regularly deployed.”

Leading industry analyst firm KuppingerCole has published an independent, third-party, expert review of BeyondTrust’s PowerBroker for Unix & Linux. In the eight-page report, the firm...

Access Management Explained

Access management (AM) grants an operator control over identifying, tracking and managing authorized or specified users' access to a system, application or any IT instance. The process will cover...

Mitigating Security Breaches Through Proper Identity Governance

As the business world becomes more interconnected and digitised, data breaches are becoming ever more common. What’s concerning is that the frequency of data breaches will only continue to...

Guide to Privileged User Security Best Practice

The threat of cyber attacks has grown tremendously over the years, with high profile attacks continuing to make headlines. In order to protect their networks and data, enterprises around the world...

Privilege Creep Explained

In an IT organisation, each employee has their own set of privileges which they need to perform their duty. One such privilege may be the right to access a particular system resource like file...

Pages

Subscribe to RSS - Identity & Access