Identity management & protection News
July 06, 2017
Ivanti acquires user environment management vendor RES Software for its automation and identity management tech. The deal follows Ivanti's 2016 deal for RES competitor AppSense.
June 28, 2017
An IT pro at Cloud Identity Summit shares his experience implementing identity management at the University of Oklahoma and describes what pitfalls to avoid.
February 24, 2017
The Cloudflare bug in CDN is fixed after causing sensitive customer data to leak. Google Project Zero discovered the flaw, and users were warned to change passwords.
February 16, 2017
Experts at RSAC 2017 discussed national cybersecurity policy suggestions for the new presidential administration, including what to do about encryption and the DHS mission.
Identity management & protection Get Started
Bring yourself up to speed with our introductory content
Mobile device use in healthcare has created new challenges for hospital IT. Using tools like mobile device management can help secure health data. Continue Reading
AWS security encompasses server tools and concepts. Enterprises that use the right services, VPCs, encryption and DevSecOps can avoid major gaffes that can expose valuable data. Continue Reading
IT admins sometimes need to have eyes in the back of their heads when it comes to keeping track of who is trying to access company data. That's where ID management comes in. Continue Reading
Evaluate Identity management & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The endpoint world is changing rapidly, and IT admins are running to keep up. Unified endpoint management could help them bring some order to the chaos. Continue Reading
Researchers identified 110 malicious Tor HSDirs that were found snooping information. Expert Kevin Beaver discusses the takeaways from this research for enterprises. Continue Reading
With more employees bringing their own devices and network-connected objects -- such as keycard controls and energy monitoring systems -- the digital footprint of the internet of things is only increasing. Yet the security industry is starting to develop an identity of things strategy.
Manufacturing, healthcare and critical-infrastructure companies have long dealt with the identity of things. Supervisory control and data acquisition engineers may be able to teach CIOs and CISOs the best way to handle device identity management. Determining which devices should access a network is a daunting task, however, because device identity management can be context dependent. Some, such as mobile phones, should be linked to users; others, such as radio frequency ID tags on cargo containers, should be linked to physical objects; and still others, such as an MRI machine or a centrifuge, need to be treated as a critical asset. To deal with the influx of devices and the identity of things, companies need to address discovery, asset identification and provisioning.
As the U.S. presidential election nears, we caught up with Nathaniel Gleicher, the former director of cybersecurity policy at the National Security Council in the White House. Gleicher, who is currently the head of Illumio's cybersecurity strategy, spoke with Information Security magazine about the Shadow Brokers' cyberweapons dump, the importance of having visibility into networks that need to be protected and the challenges of the vulnerabilities equities process.Continue Reading
Manage Identity management & protection
Learn to apply best practices and optimize your operations.
As mobile security threats arise, the need for identity management systems becomes more and more crucial. The right tools help IT protect company data and users alike. Continue Reading
Don’t treat privacy compliance as drag n’ drop; take these steps to progress your IoT data privacy journey and get ready for your GDPR close-up. Continue Reading
Office 365 users can now use Azure Active Directory for identity management solutions. Expert Brien Posey explores how that product differs from Active Directory Domain Services. Continue Reading
Problem Solve Identity management & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As public and private cloud services bring new IT security demands, data center teams need to rethink how they approach firewalls, identity management and more. Continue Reading
Many in health IT have pushed for a national patient identifier that could enable interoperability and data exchange in healthcare for a while now without much success and with much pushback from ... Continue Reading
Traditional security measures like password enforcement don't cut it when it comes to mobile devices. Instead, apply single sign-on technology to all in-house and external apps. Continue Reading