Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: IAM Security

LockPath and SailPoint Partner to Increase Security Risk Visibility

Post Image

LockPath and SailPoint Partner to Increase Security Risk Visibility LockPath, a leading provider of governance, risk management and compliance (GRC) solutions, today announced a new partnership with SailPoint, a leader in identity management. The partnership will enable organizations to integrate their GRC and identity management efforts for a streamlined approach to risk management and enterprise […]

Post Tagged with , , , ,
Read More

Centrify Wins 2016 Cloud Computing Security Excellence Award

Post Image

Centrify Wins 2016 Cloud Computing Security Excellence Award Centrify, the leader in securing enterprise identities against cyberthreats, announced today that TMC, a global, integrated media company, has named Centrify Identity Service (CIS) as a 2016 Cloud Computing Security Excellence Award winner in the category of Cloud Security. Read more at – Centrify Wins 2016 Cloud […]

Post Tagged with , ,
Read More

United Airlines Sets Minimum Bar on Security

Post Image

United Airlines Sets Minimum Bar on Security United Airlines has rolled out a series of updates to its Web site that the company claims will help beef up the security of customer accounts. But at first glance, the core changes — moving from a 4-digit PINs to password and requiring customers to pick five different […]

Post Tagged with , ,
Read More

Security teams plagued by poorly managed identity data

Post Image

Security teams plagued by poorly managed identity data Security teams handling Identity and access management (IAM) are hampered by dirty data and need data-cleansing help from a chief data officer, according to TechVision Research. To learn more, download the free report “Getting Your Identity Data Right.” Read more at – Security teams plagued by poorly […]

Post Tagged with ,
Read More

Mobile devices: A better route to ID security

Post Image

Mobile devices: A better route to ID security In the federal government, Common Access Cards and personal identity verification cards for employees and contractors incorporate biometrics and give agencies a better foundation for security and ID management than many private-sector organizations enjoy. But that wasn’t always the case. A few years ago, Kayvan Alikhani, senior […]

Post Tagged with ,
Read More

The rapidly changing security perimeter: Challenges of managing identity and access

Post Image

The rapidly changing security perimeter: Challenges of managing identity and access Cloud adoption, mobility and the consumerisation of IT present the opportunity to transform the way employees, partners and customers do business. But as organisations move to leverage these new capabilities, it’s become obvious that the IT environment is quickly becoming more distributed. “The data […]

Post Tagged with ,
Read More

Designing a Multi-layered Active Directory Security Infrastructure

Post Image

Designing a Multi-layered Active Directory Security Infrastructure Title: Designing a Multi-layered Active Directory Security Infrastructure Date: Thursday, June 9, 2016 11:00 AM – 12:30 PM ET Read more at – Designing a Multi-layered Active Directory Security Infrastructure

Post Tagged with , , ,
Read More

Identity and access management infrastructure is misaligned with security

Post Image

Identity and access management infrastructure is misaligned with security Several CISOs I’ve spoken to over the past few years agree that identity is a new security perimeter. The thought here is that a combination of mobile device and cloud use renders existing network perimeters obsolete, so security policy enforcement decisions must be driven by identity […]

Post Tagged with ,
Read More

Secure Cloudlink intros identity and access management solution

Post Image

Secure Cloudlink intros identity and access management solution British cloud security software firm Secure Cloudlink Ltd. has introduced a new, patented cloud services brokerage (CSB) solution providing secure identity management and cloud services distribution to eliminate the need for passwords. The new solution supports three factor, SSO (single sign on) and biometric user authentication. However, […]

Post Tagged with , ,
Read More

CA Technologies Strengthens Identity-Centric Security Portfolio

Post Image

CA Technologies Strengthens Identity-Centric Security Portfolio with Breach Prevention Capabilities Designed to Control Privileged User Access in VMware NSX Environments CA Technologies announced new product releases in its identity-centric security portfolio that protect and enable the hybrid enterprise, from cloud, distributed and mobile to mainframe. A new release of CA Privileged Access Manager* helps control […]

Read More