Displaying items by tag: IAM

GUEST OPINION:  Cybercriminals are constantly on the hunt for new ways to gain access to corporate IT infrastructures. Increasingly, their targets of choice are identity and privilege.

Published in Security

GUEST OPINION:  In today’s digital age, business relationships are no longer confined to the bricks-and-mortar office. Organizations depend on a complex, often global, network of vendors, suppliers, and third-party partners. With B2B relationships, sharing sensitive data is necessary for collaboration and efficiency, but this presents its own set of challenges.

Published in Guest Opinion

Throughout human history, there have been many instances where the number 3 has had a unique significance. In ancient Greece, for example, it was considered the perfect number reflecting harmony, wisdom and understanding. For me, I find that if three or more unrelated people start talking about a specific topic, it takes on a particular relevance. The topic of the moment on every CISO’s lips seems to be unmanaged devices.

Published in Guest Opinion

GUEST OPINION:  Financial services firms around the world are facing a perfect storm of escalating cyber threats, evolving customer demands, and a tightening regulatory landscape. Legacy Identity and Access Management (IAM) systems, often a patchwork of on-premises solutions and point products, are proving inadequate to navigate these challenges. These outdated systems struggle with scalability, lack agility, and create security vulnerabilities.

Published in Guest Opinion
Wednesday, 01 May 2024 10:54

World Password Day

GUEST OPINION:   Organisations should adopt passwordless authentication to withstand the ever-looming threats of cyber attacks, including phishing, keylogging, and man-in-the-middle attacks.

Published in Guest Opinion

GUEST OPINION: Skilled cybersecurity talent is in tight supply. It's challenging to recruit, hire and retain skilled professionals: trends that are expected to continue into the near future.

Published in Guest Opinion
Wednesday, 16 February 2022 14:14

Why automate those cloud apps – because hackers do

GUEST OPINION: Migrating to the cloud is no longer a forward looking trend: it's the industry mainstream, with about 70% of production applications running in the cloud. Clearly, cloud security is becoming synonymous with cybersecurity.

Published in Guest Opinion
Wednesday, 03 November 2021 20:01

SecureAuth acquires passwordless specialist Acceptto

Identity specialist SecureAuth has acquired Acceptto, which provides passwordless authentication as well as behavioural modelling before, during and after authorisation to determine whether a user is a threat.

Published in Deals

Ping Identity helps Mortgage Choice deliver "enterprise-grade security to franchisees across Australia" while the company reports a 65% cost reduction with the deployment of the Ping Intelligent Identity Platform.

Published in Development
Thursday, 03 October 2019 12:40

Ping Identity delivers self-service IAM

Identity vendor Ping Identity's PingCentral brings self-service to enterprise identity and access management (IAM).

Published in Security
Wednesday, 21 December 2016 12:28

Are you who you say you are?

A top security executive says it is going to take more than proofing to stop ID fraud.

Published in Security
Wednesday, 18 February 2015 16:23

First Point partners with Stealthbits on IAM security

Brisbane-based Identity and Access Management (IAM) solutions provider First Point Global has partnered with global data security company STEALTHbits Technologies to provide extended identity and access governance capabilities to its customers.

Published in Resellers

Today's ever-increasing threat landscape has resulted in the deployment of disparate identity and access management (IAM) solutions that require an inordinate amount of time, resources and costs to administer. Unlike traditional IAM platforms, Quest Software has taken a completely unified approach with Quest One Identity Solutions, which is now reinforced by the newly acquired BiTKOO granular access technology. As a result, Quest Software is positioned to deliver the most comprehensive IAM solution on the market that lets businesses save time, reduce costs and increase security.

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments