<
>

Posts in Identity & Access

Oracle IDCS: A Hybrid Identity Cloud Platform at Work

Oracle’s Access Management platform provides innovative services that complement traditional access management capabilities. In particular, it can be easily integrated with the Oracle Identity...

Two Factor Authentication a Basic Need for Security Protocol

Breaches in security and fraud have been a hot topic for some time now. According to recent news, a Cyber Security Agency of Singapore (CSA) survey showed that between 50 and 70 percent of...

Okta and VMware Announce Partnership to Deliver Advanced Identity Capabilities for the Digital Workspace

Okta, Inc. and VMware, Inc. today announced a partnership and integration between VMware Workspace ONE and the Okta Identity Cloud, intending to enable customers to easily and more securely move to...

BeyondTrust PowerBroker for Windows Introduces New Ways to Help IT Security Teams Manage Access Policy Efficiently

BeyondTrust, the leading cybersecurity company dedicated to preventing privilege misuse and stopping unauthorized access, today announced two new features in PowerBroker for Windows that help IT...

The Invisible Thread Between Dolphins and Digital Personal Assistants

Author: Morey Haber, CTO, BeyondTrust What do dolphins and digital personal assistants like Amazon Echo, Google Assistant, and Apple’s HomePod have in common? They all can hear and respond...

Aerohive® Starts Shipping A3 - Secure Access Management Solution

Aerohive Networks™, a Cloud Networking leader, today launched A3, a new vendor-agnostic Secure Access Management solution that introduces a comprehensive, yet simplified approach to IoT, BYOD,...

Centrify and SailPoint Join Forces to Apply Zero Trust Security Best Practices to Identity Governance

Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced that it has joined the SailPoint® Technologies Holdings, Inc. (NYSE: SAIL) Identity+...

CyberArk Announces Strong First Quarter 2018 Results

CyberArk, the global leader in privileged access security, announced financial results for the first quarter ended March 31, 2018. “We were pleased to start 2018 with a very strong...

StorMagic chooses Cryptsoft to bring KMIP-based Key Management to its SvSAN Data Encryption Solution for Hyperconverged Storage Environments

Cryptsoft continues to extend its role as the global market-leading supplier of Key Management Interoperability Protocol (KMIP) technologies to the storage and infrastructure market segments,...

What Battlestar Galactica and Privileged Access Management have in common?

Author: Morey Haber, CTO, BeyondTrust   Science fiction fans will get the irony of this blog title. For those who do not remember the 1980’s TV show Battlestar Galactica,...

Pages

Subscribe to RSS - Identity & Access