Authentication & authorization News
January 20, 2016
New surveys from Kaseya and Clutch indicate continuing demand for managed services and suggest companies offering a wider range of services may see the highest growth.
August 14, 2015
There are a number of paths to enterprise mobility, and in many cases, EMM takes a backseat to apps.
July 02, 2015
When Carlisle Construction Materials needed help going cloud-first, it turned to Okta not just for IAM but, later, its new EMM suite.
May 22, 2015
Hybrid storage vendor NexGen Storage showcased the Priority Partner Network and its newly launched partner portal. Also this week, Tech Data signed deals with Barracuda and Blueforce Development Corp.
Authentication & authorization Get Started
Bring yourself up to speed with our introductory content
For all of its popularity, container technology still has security vulnerabilities that IT teams must address. Following several best practices can keep resources safe. Continue Reading
How does Amazon's Simple AD differ from Microsoft's Active Directory, and what security issues should be considered before creating a Simple AD? Expert Dan Sullivan explains. Continue Reading
Azure Active Directory allows admins to manage end-user identities and comes in three versions. Which one depends on your enterprise's size and budget. Continue Reading
Evaluate Authentication & authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Virtual EPC presents mobile operators with significant new business opportunities, including the chance to participate in the growing IoT market. Continue Reading
Expert Dan Sullivan outlines the security features offered with Amazon Elastic File System and explains why privilege controls are critical to Amazon workload security. Continue Reading
The new Java EE security API is a proposal for baking better security into Java EE, and could ease many security implementation headaches. Continue Reading
Manage Authentication & authorization
Learn to apply best practices and optimize your operations.
Can the new Amazon API Gateway help make the AWS public cloud networks more secure? Expert Dan Sullivan examines how this new tool can benefit enterprises. Continue Reading
To avoid internal conflict and drive revenue gains, organizations need to properly manage, secure and authenticate their APIs. Continue Reading
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees. Continue Reading
Problem Solve Authentication & authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Before utilizing cloud database services, there are several security considerations to keep in mind and prepare for. Expert Dan Sullivan explains. Continue Reading
A report from Adallom highlights the lack of SaaS security in enterprises, but expert Dave Shackleford has ways to take back the cloud and lessen the risks, such as enhanced cloud app security. Continue Reading
Expert Dan Sullivan explains which policies and security controls enterprises should include in their cloud infrastructure security program to prevent cloud security compromises. Continue Reading