Enterprise User Provisioning Tools
- January 08, 2015
Video: Lieberman Software CEO Philip Lieberman explains how privileged identity management can shore up the many weaknesses of password-based authentication.
- May 20, 2014
A new survey finds that, despite the huge looming threat of malicious insiders, many enterprises fail to implement proper privileged user controls.
- November 21, 2013
Edward Snowden's NSA leaks sparked much discussion on insider threats, but a recent study suggests privilege management policies remain unadjusted.
- October 25, 2013
The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.
- March 25, 2013
This month, Information Security Magazine examines security industry changes that can really make a difference: improving identity management and building security into software from the get go.
- February 10, 2010
Expanding use of verification questions prompts concerns about privacy issues, but businesses say KBA has been vital in reducing fraud.
- April 20, 2009
Updated: As a combined company, Oracle and Sun Microsystems will be the No. 1 vendor in enterprise identity management, but analysts and a competing vendor say consolidating and unifying the product portfolio could be a painful process for customers.
- October 20, 2008
Sun's Identity Compliance Manager gives enterprises a starting point for more complex ID management projects, says analyst.
- May 27, 2008
Trader Jerome Kerviel conducted more than $7 billion in fraudulent trades with the help of an assistant, according to an investigation conducted by banking giant Societe Generale
- April 08, 2008
M-Tech will become Hitachi ID Systems under the deal. The M-Tech acquisition is part of a broader trend of companies aggressively acquiring IAM technology.
- March 04, 2008
Sun Microsystems is making a move into the governance, risk and compliance market, ramping up the competition against Oracle, IBM, CA and others.
- February 08, 2008
Analyst Mark Diodati describes the leaders of the identity management market; IBM's Joe Anthony explains Big Blue's strategy and Novell's Dale Olds on user-centric identity.
- December 12, 2007
Big Blue is melding automated features from its lightweight Express version in what it says should simplify deployments and ease end user pain.
- December 10, 2007
Companies that identify, monitor, report and investigate audit trails and conduct risk analytics are taking the right steps to protect critical data, according to one expert.
- November 14, 2007
While most firms are pleased with the results of their identity management implementation, they faced many initial hurdles.