Authentication

Authentication & authorization News

View All News

Authentication & authorization Get Started

Bring yourself up to speed with our introductory content

  • VMware Access Point allows safe access to end-user computing resources

    VMware Access Point relies on authentication, verification and isolation to create a secure gateway through which users can access end-user computing resources. Continue Reading

  • Seamless authentication and access management: Securing the connected car and customer experience

    As the connected car becomes more mainstream, car manufacturers require an identity and access management system that's both reliable and agile. Continue Reading

  • Augmented reality technology is coming to a business near you

    Workers around the world found themselves following Pokémon Go characters into the lunchroom and around their office parks this year. It won't be the last time we see augmented reality technology in the workplace. Manufacturing companies can use augmented reality technology to let workers view blueprints hands-free, for instance, and AR can help others gain powerful insight into how users interact with certain apps. This issue's cover story delves into business uses for AR.

    Plus, learn how developers must take browser capabilities into consideration when creating web apps. In this month's Deep Dive, get to know the ins and outs of identity and access management as a service -- a technology that's becoming more critical as users are more tied to their profiles than ever. And in a Q&A with the inventor of the term COPE, learn why businesses should consider the corporate-owned, personally-enabled device model. One such device companies may be adopting is Apple's latest, the iPhone 7, featured in this month's Device Spotlight. Finally, editors look back at the big end-user computing trends of 2016 and peek at what's to come in 2017.

     Continue Reading

View All Get Started

Evaluate Authentication & authorization Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Authentication & authorization

Learn to apply best practices and optimize your operations.

  • Insider Edition: Attaining security for IoT, through discovery, identity and testing

    Ever since the internet of things became a "thing," the potential for abuse has been well documented; how best to achieve security for IoT is not yet clear. This Insider Edition of Information Security magazine tackles that second issue head on.

    In three feature stories, our experts examine the key aspects closely related to IoT security: device discovery, IoT identity and IoT security testing. It's basic to security that, to devise a proper security strategy, a security team must possess an accurate record of what exactly needs to be secured. The challenge when it comes to security for IoT is in cataloging, assessing and classifying devices that can number into the thousands and are often located outside an enterprise's physical boundaries. Certain industries, such as healthcare, are well into tackling this challenge. But increasingly more companies of all sizes will have to give the issue careful attention. Discovery involves identity issues, another focus of this edition, and once a security team has refined their IoT security policy, the next logical step is to implement a process of IoT security testing.

    Readers of this Insider Edition will come away with a deeper understanding of how to approach security for IoT, from how to create a compilation of what needs to be secured to how to set up a successful security testing process. When it comes to internet of things security, the threat of breaches may never be fully eliminated, but the odds that enterprises will thwart attacks can be improved through proper policy and security systems.

     Continue Reading

  • Set up an IAM system for public cloud

    To increase security and monitor user access to public cloud resources such as compute and APIs, admins can use federated identity and access management. Continue Reading

  • Build bridges between domain and Microsoft accounts with Group Policy

    BYOD disrupted how the IT department managed resources. Now, administrators face a management challenge presented by a new interloper -- Microsoft accounts. Continue Reading

View All Manage

Problem Solve Authentication & authorization Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close