Cloud security

Identity management & protection News

View All News

Identity management & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Identity management & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Identity management & protection

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Identity management & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Startup is working to make unique patient identifier a reality

    Many in health IT have pushed for a national patient identifier that could enable interoperability and data exchange in healthcare for a while now without much success and with much pushback from ... Continue Reading

  • Use single sign-on technology to integrate mobile app access

    Traditional security measures like password enforcement don't cut it when it comes to mobile devices. Instead, apply single sign-on technology to all in-house and external apps. Continue Reading

  • Cybersecurity and privacy compliance: The delicate balance

    As information has transformed into a huge business asset for modern companies, it has come at a price: Data is now a target for hackers seeking sensitive information about enterprises and their customers. This new online data security focus has forced businesses to invest in resources that protect trade secrets and other company information. At the same time, ensuring personal privacy has become a top concern for consumer advocates, and data security initiatives sometimes infringe on personal information protection measures. For companies to be successful in the digital age, GRC resources must walk the fine line between adequate cybersecurity and privacy protection for both employees and customers. In this handbook, learn the latest data governance strategies to help organizations strike this balance necessary to protect both corporate and personal information. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close