System News
 1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: Identity Management
21 Jul 2017 The Curse Of The Ex-Employee [65047]
Information Age, July 21st 2017

"New research from OneLogin finds more than half of ex-employees still have access to corporate applications...

Despite businesses of all sizes becoming increasingly security conscious, a new study from OneLogin, the identity management provider bringing speed and integrity to the modern enterprise, reveals many businesses aren't doing enough to guard against security threats brought on by ex-employees..."
(Get More Information . .) open to premium members only

18 May 2017 3 In 5 Companies Expect To Be Breached In 2017 [63465]
HelpNet Security, May 18th 2017

"New research found that of the 50 percent who reported being breached in 2016, the average material impact to the business was $4 million.

Vanson Bourne interviewed 600 senior IT decision-makers at organisations with at least 1,000 employees across Australia, France, Germany, Italy, the United Kingdom and the United States.

The survey found that 35 percent of companies suffered two or more breaches in the last twelve months. Unfortunately, 3 in 5 expect to be breached in 2017, with 29 percent believing they won't even know they were breached when it happens. As a result, survey respondents are focused on mitigating their exposure points as an organisation - with 65 percent seeing identity management as a foundation of their security strategy..."
(Get More Information . .) open to premium members only

26 Apr 2017 Centrify Warns Password Vaults Alone Not Enough to Stop Data Breaches [62841]
Centrify, April 26th 2017

Innovative new capabilities help organizations implement privileged identity management (PIM) best practices and greatly reduce risk of a breach

Centrify, the leader in securing hybrid enterprises through the power of identity services, announced significant enhancements to its best-in-class privileged identity management (PIM) solution to stop breaches that abuse privilege. By minimizing the attack surface and controlling privileged access to the hybrid enterprise, Centrify's new capabilities enable organizations to move from static, long-lived privilege assignments to a just-in-time model where advanced monitoring detects and alerts in real-time on the creation of backdoor accounts that make it easy to bypass a password vault.
(Get More Information . .) open to premium members only

04 Apr 2017 Intercede And Centrify Partner To Streamline Secure Mobile Access For Highly Regulated Enterprises [62206]
Centrify, April 4th 2017

Intercede's MyID technology and Centrify Identity Service enable compliance with HSPD 12 and open new mobile use cases for employees

Today, cybersecurity and identity management expert Intercede announces a partnership with Centrify, the leader in securing hybrid enterprises through the power of identity, to secure and manage mobile access in highly regulated industries who must comply with Homeland Security Presidential Directive 12 (HSPD-12), FIPS 201-2 and NIST 800-157.

Interecede's MyID enables enterprises to replace employee passwords with more secure and convenient digital identities on smart cards. This solution then manages the lifecycle of credentials, for example revoking them if a user leaves an organisation or updating them in advance of the credentials expiring. All credential issuance and lifecycle events are recorded into MyID, providing full visibility and audit capabilities.
(Get More Information . .) open to premium members only

03 Apr 2017 In The Cyber Evolution, Identity And Access Management Is A Key Player [62137]
GCN, April 3rd 2017

"The National Institute of Standards and Technology recently announced plans to update to its cybersecurity framework. Updates proposed in version 1.1 of the Framework for Improving Critical Infrastructure Cybersecurity will, among other changes, increase the focus on identity management, a pillar of security that has become more important since the initial version of the framework was released in 2014.

The category, now titled Identity Management, Authentication and Access Control, clarifies the definitions of the terms 'authentication' and 'authorization,' and includes and defines the term 'identity proofing' for the first time..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 9 10 11 next






!-- end archive_section.tpl -->