Identity Management Technology and Strategy News
February 18, 2015
The high percentage of password reuse and sharing by employees leaves enterprises vulnerable to breaches, according to a recent survey from SailPoint Technologies.
December 14, 2012
Verizon and Criterion Systems will conduct a series of tests of a new validation process being designed for sensitive online transactions.
July 20, 2011
President Obama's proposed Identity Ecosystem seeks to lock down personal credentials, but is it actually feasible?
February 17, 2011
Verizon enhanced its enterprise identity management services with identity registration, credential provisioning and risk-based authentication.
Identity Management Technology and Strategy Get Started
Bring yourself up to speed with our introductory content
Organizations are often looking to minimize costs without compromising on security. Expert Randall Gamby examines the benefits of open source identity management software. Continue Reading
FIDO (Fast ID Online) is an open standard for a secure and easy-to-use universal authentication interface created to address the lack of interoperability among strong authentication devices. Continue Reading
A single-factor token is a small hardware device that produces one confirming credential for user authentication; the devices may be used in conjunction with other types of credentials for multifactor authentication. Continue Reading
Evaluate Identity Management Technology and Strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Video: Learn how to use KeePass, the free password-management tool that can offer cash-strapped enterprises a way to help employees encrypt and secure their work-related passwords. Continue Reading
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity Continue Reading
Tying log management to user identity shortens incident response and forensics investigation cycles. Learn how compliance has mandated that organizations determine not only when incidents occurred, but who is responsible for unauthorized access. Continue Reading
Product ReviewsPowered by IT Central Station
Enables us to sell products which creates significant revenue but their disaster recovery needs improvementPowered by IT Central Station
Valuable Features: The Registration/Login Management and Single Sign On tools are extremely valuable for us. They have allowed us to migrate a...Continue Reading
The UI for requesting and approving rights has been outdated, but in the latest version that has been addressedPowered by IT Central Station
Valuable Features: Event driven provisioning and powerful Development and documentation tool - Designer are the most valuable features on NetIQ...Continue Reading
Powered by IT Central Station
Valuable Features: Risk Analysis Engine Business-IT Role Mining, Certifications Dynamic Grouping Life Cycle Management Provisioning Integration...Continue Reading
Manage Identity Management Technology and Strategy
Learn to apply best practices and optimize your operations.
This Security School covers need-to-know information about cloud-based identity and access management, including best practices as well as its pros and cons. Continue Reading
Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user ... Continue Reading
Download the latest Pocket Guide to Managing Identities in a Hybrid World. Continue Reading
Problem Solve Identity Management Technology and Strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
An authentication framework based on a decentralized operational model is commonplace in the financial-services market, but complicates compliance. In this tip, Randall Gamby explains how financial companies can migrate to a centralized ... Continue Reading