Ethernet switches

Identity management & protection News

  • April 01, 2016 01 Apr'16

    Can cybersecurity spending protect the U.S. government?

    CNAP articulates the right things, as many U.S. government cyber initiatives do, but what has captured the attention of the Beltway is the billion-dollar budget proposals.

  • February 16, 2016 16 Feb'16

    Ransomware attack causes internal emergency at Hollywood hospital

    The FBI, along with the LAPD, began investigating a ransomware attack at a Hollywood hospital that has crippled the facility's operations and could cost millions.

  • January 13, 2016 13 Jan'16

    IT in the gutter with mobile compliance

    A lot of organizations don't understand what it takes to maintain compliance on mobile. It starts with keeping track of devices and apps.

  • January 13, 2016 13 Jan'16

    Mobile compliance brings more IT complexity

    BYOD and consumerization have changed the way IT needs to approach regulatory compliance. Admins must work with legal and other departments to enforce compliance, which is challenging when employees use their own mobile devices and consumer cloud services at work. The cover story in this issue of Modern Mobility explains why many IT departments continue to struggle with compliance in the mobile era, and what tools are available to help admins get a better grasp on best practices.

    Readers will also get an in-depth look at how Microsoft's Universal Windows Platform works and how the company can take a bigger piece of the mobility pie with its Continuum feature for Windows 10 devices. In this month's Q&A, mobile expert Bob Egan gives a reality check on the Internet of Things and reveals just how long this trend has been around. And last but not least, Device Spotlight features a look at Apple's biggest tablet yet: the new iPad Pro.

View All News

Identity management & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Identity management & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Identity management & protection

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Identity management & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Startup is working to make unique patient identifier a reality

    Many in health IT have pushed for a national patient identifier that could enable interoperability and data exchange in healthcare for a while now without much success and with much pushback from ... Continue Reading

  • Use single sign-on technology to integrate mobile app access

    Traditional security measures like password enforcement don't cut it when it comes to mobile devices. Instead, apply single sign-on technology to all in-house and external apps. Continue Reading

  • Cybersecurity and privacy compliance: The delicate balance

    As information has transformed into a huge business asset for modern companies, it has come at a price: Data is now a target for hackers seeking sensitive information about enterprises and their customers. This new online data security focus has forced businesses to invest in resources that protect trade secrets and other company information. At the same time, ensuring personal privacy has become a top concern for consumer advocates, and data security initiatives sometimes infringe on personal information protection measures. For companies to be successful in the digital age, GRC resources must walk the fine line between adequate cybersecurity and privacy protection for both employees and customers. In this handbook, learn the latest data governance strategies to help organizations strike this balance necessary to protect both corporate and personal information. Continue Reading

View All Problem Solve