Identity management & protection News
May 31, 2016
The time isn’t far away when everything in our lives, from furniture to coffee pots, will have the ability to be "smart." Various reports estimate that there will be anywhere between 30 to 200 ...
April 01, 2016
CNAP articulates the right things, as many U.S. government cyber initiatives do, but what has captured the attention of the Beltway is the billion-dollar budget proposals.
February 16, 2016
The FBI, along with the LAPD, began investigating a ransomware attack at a Hollywood hospital that has crippled the facility's operations and could cost millions.
January 13, 2016
A lot of organizations don't understand what it takes to maintain compliance on mobile. It starts with keeping track of devices and apps.
Identity management & protection Get Started
Bring yourself up to speed with our introductory content
Personally identifiable information can live outside the databases on corporate networks, and it needs to be locked down so attackers can't get it. Luckily, there are free tools IT can use to improve PII security. Continue Reading
In this tip, learn how automated compliance management can overcome enterprise mobility complications and save valuable company resources. Continue Reading
After your IT shop has prepped its environment for an Office 365 migration, choose a remediation plan based on your migration approach. Continue Reading
Evaluate Identity management & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The cost of a stolen mobile device is nothing compared to the value of lost data. To ensure mobile app security, IT should consider policies beyond mobile device management. Continue Reading
After Citrix released a cloud-based management platform in 2015, VMware answered with Workspace One, which combines enterprise mobility management, user authentication and a virtual desktop platform. Continue Reading
There are six components to mobility management software, and they all play a part in enabling a secure mobile workforce. But their overlap can lead to complexity. Continue Reading
Manage Identity management & protection
Learn to apply best practices and optimize your operations.
IT admins need identity management tools to ensure network users are who they say they are. This applies to mobile users on an enterprise WLAN and the wired network itself. Continue Reading
Users see a false tradeoff between ease of access for users and IT governance and control in content management. Can identity management break the stalemate? Continue Reading
Data breaches can point to issues with security tools and their implementation. Some companies that are putting personally identifiable information at risk may surprise you. Continue Reading
Problem Solve Identity management & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Many in health IT have pushed for a national patient identifier that could enable interoperability and data exchange in healthcare for a while now without much success and with much pushback from ... Continue Reading
Traditional security measures like password enforcement don't cut it when it comes to mobile devices. Instead, apply single sign-on technology to all in-house and external apps. Continue Reading
As information has transformed into a huge business asset for modern companies, it has come at a price: Data is now a target for hackers seeking sensitive information about enterprises and their customers. This new online data security focus has forced businesses to invest in resources that protect trade secrets and other company information. At the same time, ensuring personal privacy has become a top concern for consumer advocates, and data security initiatives sometimes infringe on personal information protection measures. For companies to be successful in the digital age, GRC resources must walk the fine line between adequate cybersecurity and privacy protection for both employees and customers. In this handbook, learn the latest data governance strategies to help organizations strike this balance necessary to protect both corporate and personal information. Continue Reading