System News
 1 2 3 next
Articles for the keywords: IAM
20 Mar 2017 Identity And Access Management Terms Your C-Suite Needs To Know [61729]
Infoworld, March 20th, 2017

"Now that your C-suite understands your company's information security program, it's time to move further into the educational phase.

As you evaluate and prioritize the risks your organization faces, identity and access management (IAM) should become a clearer and clearer priority. To help you educate your CEO on the need for increased investment in modern IAM solutions, here is some key IAM terminology that you can use as you work to transition your company to a more modern strategy..."
(Get More Information . .) open to premium members only

15 Feb 2017 Centrify's Onsite RSA Survey Reveals Almost Half of Respondents Lack Confidence in Their Company's Cybersecurity Strategies [60669]
Organizations need to employ Identity and Access Management best practices

Centrify, the leader in securing hybrid enterprises through the power of identity services, announced the results from an onsite survey of IT professionals attending the RSA Conference, being held this week at Moscone Center, San Francisco. The survey asked IT professionals how their companies secure applications and infrastructure in the age of access, and it revealed that a startling number lacked confidence in their own organization's corporate security.

Only slightly more than half (55%) stated they believe their company's current technology investment ensures their company's cybersecurity. But when pressed about which of the 15 different identity and access management (IAM) best practices they use, many fell short on implementing enough of them to warrant a confidence score.
(Get More Information . .) open to premium members only

22 Aug 2016 8 Tips For Keeping Your Data Safe With Identity And Access Management (Slideshow) [55533]
CSO Online, August 22nd, 2016

"With the proliferation of cloud applications, IAM solutions are a necessity.

New web applications are making their way into the workplace at an unprecedented rate. By 2017, enterprises are projected to rely on an average of 52 cloud applications at work, leaving employees with a pool of credentials to keep track of. If you don't take the necessary precautions to keep your credentials secure, your accounts and data are at risk of being compromised. With these tips for good password hygiene and deploying an identity and access management (IAM) solution, you can keep your data safe from the rapidly evolving threat landscape. Richard Walters, senior vice president of security products at Intermedia, offers these tips..."
(Get More Information . .) open to premium members only

12 Aug 2016 Is Artificial Intelligence The Next Frontier For Identity Management? [55107]
Business 2 Community, August 12th, 2016

Identity management professionals have seen significant changes in the industry in recent years, and the pace of change is only accelerating. In the past, workforce Identity and Access Management (IAM) evolved to keep up with a growing need for access to workforce systems. Now Customer Identity and Access Management (CIAM) is critically important as businesses undergo digital transformation and engage with customers across multiple apps and channels.
(Get More Information . .) open to premium members only

31 May 2016 The Future Of Identity Management: Passwords And The Cloud [53047]
Help Net Security, May 31st, 2016

"Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance. With a surge in cybercrime, it's no wonder that the global identity and access management (IAM) market is expected to reach USD 24.55 billion by 2022, according to Research and Markets..."
(Get More Information . .) open to premium members only

 1 2 3 next

!-- end archive_section.tpl -->