Remote network mgmt

Identity management & protection News

  • January 13, 2016 13 Jan'16

    IT in the gutter with mobile compliance

    A lot of organizations don't understand what it takes to maintain compliance on mobile. It starts with keeping track of devices and apps.

  • January 13, 2016 13 Jan'16

    Mobile compliance brings more IT complexity

    BYOD and consumerization have changed the way IT needs to approach regulatory compliance. Admins must work with legal and other departments to enforce compliance, which is challenging when employees use their own mobile devices and consumer cloud services at work. The cover story in this issue of Modern Mobility explains why many IT departments continue to struggle with compliance in the mobile era, and what tools are available to help admins get a better grasp on best practices.

    Readers will also get an in-depth look at how Microsoft's Universal Windows Platform works and how the company can take a bigger piece of the mobility pie with its Continuum feature for Windows 10 devices. In this month's Q&A, mobile expert Bob Egan gives a reality check on the Internet of Things and reveals just how long this trend has been around. And last but not least, Device Spotlight features a look at Apple's biggest tablet yet: the new iPad Pro.

  • November 23, 2015 23 Nov'15

    Mainframe applications may not be as secure as you think

    Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security.

  • October 29, 2015 29 Oct'15

    Congress can still fix CISA privacy issues in reconciliation

    CISA passed the Senate despite complaints over privacy issues, but experts said there is still hope those troubles can be fixed when the bill goes to the House for reconciliation.

View All News

Identity management & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Identity management & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Identity management & protection

Learn to apply best practices and optimize your operations.

  • Cybersecurity and privacy compliance: The delicate balance

    As information has transformed into a huge business asset for modern companies, it has come at a price: Data is now a target for hackers seeking sensitive information about enterprises and their customers. This new online data security focus has forced businesses to invest in resources that protect trade secrets and other company information. At the same time, ensuring personal privacy has become a top concern for consumer advocates, and data security initiatives sometimes infringe on personal information protection measures. For companies to be successful in the digital age, GRC resources must walk the fine line between adequate cybersecurity and privacy protection for both employees and customers. In this handbook, learn the latest data governance strategies to help organizations strike this balance necessary to protect both corporate and personal information. Continue Reading

  • Cloud apps benefit from identity management architecture

    Implementing a federated identity management architecture for cloud apps enables flexibility. Learn about the benefits of building a security tier that improves the user experience. Continue Reading

  • Can a subscription ease SSL certificate management?

    SSL subscription services are emerging to help enterprises handle the daunting task of SSL certificate management. Expert Michael Cobb discusses the benefits of such a service. Continue Reading

View All Manage

Problem Solve Identity management & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve