Skip to content

Discovering IAM blogs around world

  • Privacy Policy

Tag: Identity cloud

Symplified Explain how to Secure the Cloud using Identities

Symplified Vice President to Explain how to Secure the Cloud using Identities at Cloud Expo Europe Cloud Identity Expert will Present Role of Identity and Access Management in Cloud Security. Read more...

Ping Identity Announces New ZDNet Blog Addresses Why “Identity Matters”

Fueled by cloud adoption, mobile computing, privacy, security and similar trends, identity and access management emerged as one of the fastest growing markets in 2011 – a trend that will Read more...

Cloud Identity – VMware Horizon Application Manager

An example of a vendor technology that can be used to implement Cloud Identity and Security Best Practices is the Horizon Application Manager from VMware. As this article explains the Read more...

Cloud Identity and Security Best Practices

One of our major program areas is Cloud Identity and Security Best Practices (CloudIDsec). Here is our Linkedin social community for this, and the practice will shortly be underpinned by Read more...

Federated identity management: Made for the cloud

The motivations for moving your business’ existing internal applications to the cloud, developing new applications in the cloud, or subscribing to cloud- based software as a service products are clear. Read more...

FishNet Security Acquires Leading Information Security Firm

FishNet Security announced today it has acquired Logic Trends Inc., a leading information security provider of identity and access management solutions. Read more here… Read more...

A Case Study in Building a Secure Cloud with Identity Management

Security is the number one barrier to cloud adoption. Organizations that move applications into the cloud have to bridge the security gap between the enterprise and the cloud by providing Read more...

Cloud Identity and Security Best Practice

As highlighted the Kantara initiative provides a best practices forum for Federated Identity security, and these can be used to build and offer ‘IDaaS’ – Identity as a Service. Read Read more...

Intercede Group plc : Intercede Continues US Expansion

tercede Group plc, the developer of the Intercede MyID® identity and credential management system today announces its has been approved as a United States Treaty Investor (E2) by the US Read more...

Cintas Corporation Chooses CourionLive Cloud-Based Identity and Access Management Solution for Low Overhead, Fast Return

Courion Corporation, the leader in identity and access management for access risk, today announced that Cintas Corporation (Nas: CTAS), has chosen CourionLive™, the software as a service (SaaS) version of Read more...

Posts pagination

Previous 1 … 12 13 14 Next

Recent Posts

  • Securing Machine Identities and Preventing Outages: A Top 2025 Priority for Your Business
  • Conquer Identity Fraud: A Better Model to Safeguard Your Revenue & Reputation
  • Fast Track Your Identity Security: Passkeys & Verified Credentials
  • Email security: The current threat landscape, the latest tools/techniques
  • Fall Cyber Solutions Fest 2024: Zero Trust Track
  • Federated Identities: a one-stop hacking shop for all your credentials
  • 3 Ways to Streamline Auth, Access & Security for Oracle EBS
  • Sailpoint: Takeaways from RSA 2023: LLMs, National Defense and identity as the new cybersecurity perimeter
  • Sailpoint – Identity Security Remains Business Essential
  • Sailpoint – Welcome to the Core of Identity Security
  • BeyondTrust integrates Password Safe solution with SailPoint

Top Posts & Pages

  • Securing Machine Identities and Preventing Outages: A Top 2025 Priority for Your Business
  • Conquer Identity Fraud: A Better Model to Safeguard Your Revenue & Reputation
  • Fast Track Your Identity Security: Passkeys & Verified Credentials
  • Email security: The current threat landscape, the latest tools/techniques
  • Fall Cyber Solutions Fest 2024: Zero Trust Track
- Theme by Grace Themes