Results for multi-factor

Four Ways To Adapt Your Security for Digital Transformation – And Keep Pace with the Speed of Business

News of the Verizon data breach is just the latest reminder of how tough it is for CIOs and CISOs to balance ‘security’ vs ‘innovation’ in the age of digital transformation and hybrid (borderless) architectures.  One Identity’s Todd Peterson shares 4 proven strategies for how security professionals can be responsive to business initiatives -- without compromising on security needs. 

Full Story >

Centrify Analytics Service Uses Machine Learning and User Behavior To Stop Breaches in Real Time

A Forrester Research study, commissioned by security firm Centrify, estimates 1 billion identities were compromised in 2016.  The firm is also launching Centrify Analytics Service to shore up access protection with real-time analytics and machine learning.

Full Story >

Identity Gets Boost as ‘DNA’ for Digital Enterprise Security: Top Takeways from Ping’s Cloud Identity Summit

Could identity become the DNA for delivering agile, strong, and situational security solutions for the new-gen digital enterprise?   A growing number of security execs see the possibilities. IDN looks at the Cloud Identity Summit with execs from Ping Identity.

Full Story >

<< Start < Previous 1 Next > End >>
Showing 1 - 3 of 3