Skip to content

Discovering IAM blogs around world

  • Privacy Policy

Tag: Cloud Identity Management

McAfee Adds Identity and Access Management to Security Connected

McAfee is giving a boost to its Security Connected portfolio with the addition of identity and access management capabilities. They were previously developed and sold by Dell, but now McAfee Read more...

LexisNexis acquires identity authentication technology

LexisNexis Risk Solutions acquired RSA’s dynamic knowledge-based authentication technology in a deal that ends a six-year relationship between the two companies. Atlanta-based LexisNexis said it would integrate the technology into Read more...

Twelve Questions for Cloud Identity Management

According to Gartner, by the end of 2014, IDaaS (Identity Management-as-a-Service) will account for 25 percent of all new IAM sales, compared to less than 5 percent in 2012. At Read more...

Pragmatic Futures for Identity and Access Management

Ant Allan, research vice president at Gartner, shares his thoughts on future challenges and opportunities in the field of identity and access management (IAM): Today is the start of our Read more...

Signs Your IT Department Needs an Identity and Access Management System

Identity and access management (IAM) plays an important role within organizations. Consider this real life example. You hire a new employee and issue him a corporate email address and login Read more...

RSA: Cisco sees growing need for identity management

With enterprises increasingly moving to adopt consumerisation measures, Cisco believes that the need for strong identity management systems is greater than ever. The company said that as firms adopt the Read more...

Open Source Directory Server OpenDJ

You might start looking for an open source directory server solution around the globe an here we present you one of them. We are talking about OpenDJ which is currently Read more...

Quest One Identity Manager in few words

Quest one identity manager is another product you can use in your company to deploy it and have a provision, deprovisioning, reporting, governance, certifications among some other features based on Read more...

Cloud and Mobile Adoption Increases IT Security Risks

SailPoint today published an infographic outlining recent research results that indicate that enterprises are aggressively adopting cloud and mobile solutions for mission-critical applications – a trend that is increasing the Read more...

Understanding IAM for Cloud Services: Use Cases

To help understand why cloud computing requires companies to re-think their Identity and Access Management strategies, we will provide a handful of cases that illustrate common problems. The following cases Read more...

Posts pagination

Previous 1 2 3 4 … 6 Next

Recent Posts

  • Securing Machine Identities and Preventing Outages: A Top 2025 Priority for Your Business
  • Conquer Identity Fraud: A Better Model to Safeguard Your Revenue & Reputation
  • Fast Track Your Identity Security: Passkeys & Verified Credentials
  • Email security: The current threat landscape, the latest tools/techniques
  • Fall Cyber Solutions Fest 2024: Zero Trust Track
  • Federated Identities: a one-stop hacking shop for all your credentials
  • 3 Ways to Streamline Auth, Access & Security for Oracle EBS
  • Sailpoint: Takeaways from RSA 2023: LLMs, National Defense and identity as the new cybersecurity perimeter
  • Sailpoint – Identity Security Remains Business Essential
  • Sailpoint – Welcome to the Core of Identity Security
  • BeyondTrust integrates Password Safe solution with SailPoint

Top Posts & Pages

  • Securing Machine Identities and Preventing Outages: A Top 2025 Priority for Your Business
  • Conquer Identity Fraud: A Better Model to Safeguard Your Revenue & Reputation
  • Fast Track Your Identity Security: Passkeys & Verified Credentials
  • Email security: The current threat landscape, the latest tools/techniques
  • Fall Cyber Solutions Fest 2024: Zero Trust Track
- Theme by Grace Themes