Enterprise User Provisioning Tools
- January 08, 2015
Video: Lieberman Software CEO Philip Lieberman explains how privileged identity management can shore up the many weaknesses of password-based authentication.
- May 20, 2014
A new survey finds that, despite the huge looming threat of malicious insiders, many enterprises fail to implement proper privileged user controls.
- November 21, 2013
Edward Snowden's NSA leaks sparked much discussion on insider threats, but a recent study suggests privilege management policies remain unadjusted.
- October 25, 2013
The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.
- March 25, 2013
This month, Information Security Magazine examines security industry changes that can really make a difference: improving identity management and building security into software from the get go.
- February 10, 2010
Expanding use of verification questions prompts concerns about privacy issues, but businesses say KBA has been vital in reducing fraud.
- April 20, 2009
Updated: As a combined company, Oracle and Sun Microsystems will be the No. 1 vendor in enterprise identity management, but analysts and a competing vendor say consolidating and unifying the product portfolio could be a painful process for customers.
- October 20, 2008
Sun's Identity Compliance Manager gives enterprises a starting point for more complex ID management projects, says analyst.
- May 27, 2008
Trader Jerome Kerviel conducted more than $7 billion in fraudulent trades with the help of an assistant, according to an investigation conducted by banking giant Societe Generale
- April 08, 2008
M-Tech will become Hitachi ID Systems under the deal. The M-Tech acquisition is part of a broader trend of companies aggressively acquiring IAM technology.