WhatIs definition: BYOI (bring your own identity)

Web Authentication and Access Control

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Employee monitoring should be done with care

    Employee monitoring is on the rise as organizations try to safeguard their sensitive information and increase productivity. However, one security expert says there are several important questions to ask before implementing an employee monitoring prog... 

  • How to improve Web access controls

    Wish your enterprise provided more granular Web access to specific users? Learn how to do so by augmenting proxy servers or firewall with a Web filtering appliance, in this identity management and access control Ask the Expert Q&A. 

  • FullArmor lives up to its name

    PolicyPortal provides an Internet interface to easily configure, monitor and enforce near real-time Active Directory-based policy compliance through client agents. 

  • Employees to execs: It's OK to watch

    More than half of an average company's employees surf the Internet for fun while at work, but many workers say they don't mind if their employers control when and what they view. 

  • Extranet security strategy considerations

    Extranets can be beneficial for conducting e-commerce, but if they aren't properly secured, they can pose serious risks to you, your business partners and customers. In this tip, our network security expert, Mike Chapple, provides four tactics for lo... 

  • Fighting the uphill battle against renegade apps

    Experts say keeping unsanctioned apps and technologies off company computers is a difficult battle to win. But protecting the network is possible. 

  • IIS security: Configure Web server permissions for better access control

    Updating user access controls as business portfolios expand can help protect confidential data. Learn how to secure user access controls and keep your greatest asset under lock and key by configuring IIS Web server permissions, in this tip by SearchS... 

  • How to manage user permissions

    Managing multiple user permissions can be a daunting task. Learn best practices for managing these permissions including servicing account passwords, granting local admin access, permissions for files and shares and other access related requests, in ... 

  • Should employees have local admin rights?

    While it may save you time, granting users local administrator rights also puts your organization at risk. Discover why this practice is considered a risk and learn alternate access control methods you can use to safeguard your organization. 

  • Should an organization design and use their own Certification Authority?

    While using a unique Certification Authority may improve an organization's defense-in-depth strategy, using a commercial CA might save you time and money in the long run. Weigh the pros and cons of each, in this Ask the Expert Q&A.