Results for IAM

Four Ways To Adapt Your Security for Digital Transformation – And Keep Pace with the Speed of Business

News of the Verizon data breach is just the latest reminder of how tough it is for CIOs and CISOs to balance ‘security’ vs ‘innovation’ in the age of digital transformation and hybrid (borderless) architectures.  One Identity’s Todd Peterson shares 4 proven strategies for how security professionals can be responsive to business initiatives -- without compromising on security needs. 

Full Story >

Centrify Analytics Service Uses Machine Learning and User Behavior To Stop Breaches in Real Time

A Forrester Research study, commissioned by security firm Centrify, estimates 1 billion identities were compromised in 2016.  The firm is also launching Centrify Analytics Service to shore up access protection with real-time analytics and machine learning.

Full Story >

IBM Says Know Your Security Posture: The Key To Incident Response is Understanding Your Risks

Earlier this fall, the Internet was brought to its knees by an army of Internet of Things devices. Given this successful attack on core Internet highways, can any stand-alone company expect to protect itself? How can businesses identify, combat and even predict threats? IDN speaks with IBM Security’s Peter Allor to get suggestions, insights -- and hope.

Full Story >

ForgeRock Says IoT is Pushing Security To Become ‘Password-Less’ and More Friction-Free

ForgeRock says it’s finally time to push ‘password-less’ security.  The company is adding push authentication to its identity platform to enable password-less login and frictionless second factor authentication – for devices and human users.

Full Story >

SailPoint Updates IdentityIQ To Enable Open 'Identity-Awareness' for Enterprise Security, IT Operations

Long-time identity and access management provider SailPoint is taking a bold step to make it easy for organizations to bring IAM into the fight against hackers and data breaches. SailPoint’s IdentityIQ 7.0 IAM platform is now designed to be more easily integrated with other elements of an organization operational and IT security infrastructure.

Full Story >

Centrify Continues To Update Identity Management for Big Data with NoSQL Support

As companies continue to embrace big data, all types of sensitive and regulated data are new high-value targets for hackers. In response, Centrify is optimizing the 4As of identity and access management – authentication, authorization, auditing and assurance – for Hadoop and NoSQL.

Full Story >

SailPoint Extends IAM To Govern Unstructured Data with Acquisition of Whitebox Security

SailPoint, a long-time identity and access management provider, is beefing up its ability to protect unstructured data with its acquisition of Whitebox Security and the WhiteOPS unstructured data governance solution.

Full Story >

Akana Boosts DevOps, Automation and Security for API Management; Focus on Mobile and IoT

In a sign that APIs are driving wider aspects of enterprise architecture, Akana Inc. has integrated capabilities for DevOps automation and enterprise-class identity management into its API management platform.

Full Story >

With Amazon API Gateway, AWS Opens a New Door on Backend Applications

Running applications for over a million customers in 190 countries, Amazon Web Services is hosting data and business logic in various back-end services, such as Amazon Elastic Compute Cloud (Amazon EC2) and AWS Lambda.

Full Story >

Dell Software's InTrust 11.0 Taps Vast Data Volumes To Delivers Real-Time Security, Alerts

Dell Software’s latest update to its InTrust analytics tool mines huge data volumes to help security teams stave off security threats and quickly discover suspicious trends and anomalies. IDN looks at InTrust 11.0 features.

Full Story >

From IAM to IaaS: How to Ensure Secure Deployments With the 4 A’s

This IDN guest post from David Gorton of Ping Identity illustrates how important the well-known ‘4As’ of access management [authentication, authorization, account management and auditing) are to ensuring that applications deployed into an IaaS will have the same level of security and functionality as apps left on-premises.

Full Story >

IBM's 'Summer of Security' Helps IT Assess, Combat Risks for the Extended Enterprise

IBM is coming off a busy “summer of security,” with rollouts of products, services, partnerships and acquisitions – all aimed at helping IT better identify, diagnose, combat and even predict risks from cloud, mobile and web initiatives. IDN explores IBM’s “summer of security” with Big Blue experts and execs.

Full Story >

<< Start < Previous 1 2 Next > End >>
Showing 1 - 12 of 17