Identity management & protection

Identity management & protection News

  • August 10, 2015 10 Aug'15

    Aptec names use cases for Oracle Identity Management patch

    Aaron Perry, president of Aptec, presents use cases for Oracle Identity Management 11gR2 PS3 drawn from his client's experiences with the new patch.

  • August 05, 2015 05 Aug'15

    Patch for Oracle Identity Management aims at mobile security

    Oracle Identity Management 11gR2 PS3 extends identity management over mobile devices, as mobile becomes the platform of choice for business users.

  • August 04, 2015 04 Aug'15

    Is third-party vendor management the next IAM frontier?

    Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important as a layer of defense to protect sensitive corporate data from the threats posed by third-party vendors. In this issue of Information Security magazine, we evaluate the controls that can help protect data as it becomes more widely accessible. Today's IAM programs manage a far wider range of user types and access points. Bring your own device, cloud computing, and the rapid spread of distributed applications and data have all added to the security challenges.

    In this issue, we also look at enterprise mobility strategies. As more companies embrace a mobile-first strategy, security programs increasingly provide some level of support for personally owned devices and apps. But enterprise mobility is a double-edged sword: Providing broad data access and communication capabilities for much of the workforce can introduce challenging security issues. More CIOs and CISOs are recognizing that coherent policies are the key to harnessing the benefits of bring your own device.

    Finally, cybersecurity skills shortages are widespread. The skills to combat advanced threats have outpaced those needed for conventional IT security. We look at strategies that may ease the pain as enterprises compete for a highly sought-after global workforce.

  • July 30, 2015 30 Jul'15

    Xceedium turns deaf ear, triggers vulnerability disclosure

    Swiss research group modzero disclosed a vulnerability that enabled remote attacks on Xceedium's Xsuite privileged access manager.

View All News

Identity management & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Identity management & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Identity management & protection

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Identity management & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close