Identity management & protection News
October 06, 2016
Organizations that want to simplify device management and access are interested in workspace suites, such as VMware Workspace One.
August 18, 2016
With the departure of its most articulate champion Verify now appears dead. But Brexit means that HMG needs an effective and consistant identity policy more than ever. Has the time finally come to ...
August 17, 2016
Yesterday saw the departure of another senior figure at the Government Digital Service (GDS) as Gov.uk Verify director Janet Hughes announced she is leaving. The news, which came only weeks after ...
June 30, 2016
Hospitals and healthcare organizations are far too vulnerable to cyberattacks, and a recent healthcare security study shows the issue isn't just outdated legacy technology -- medical professionals ...
Identity management & protection Get Started
Bring yourself up to speed with our introductory content
ID management and authentication help IT answer the burning questions of who is accessing the company network, when, where and on what device. Continue Reading
Personally identifiable information can live outside the databases on corporate networks, and it needs to be locked down so attackers can't get it. Luckily, there are free tools IT can use to improve PII security. Continue Reading
In this tip, learn how automated compliance management can overcome enterprise mobility complications and save valuable company resources. Continue Reading
Evaluate Identity management & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With more employees bringing their own devices and network-connected objects -- such as keycard controls and energy monitoring systems -- the digital footprint of the internet of things is only increasing. Yet the security industry is starting to develop an identity of things strategy.
Manufacturing, healthcare and critical-infrastructure companies have long dealt with the identity of things. Supervisory control and data acquisition engineers may be able to teach CIOs and CISOs the best way to handle device identity management. Determining which devices should access a network is a daunting task, however, because device identity management can be context dependent. Some, such as mobile phones, should be linked to users; others, such as radio frequency ID tags on cargo containers, should be linked to physical objects; and still others, such as an MRI machine or a centrifuge, need to be treated as a critical asset. To deal with the influx of devices and the identity of things, companies need to address discovery, asset identification and provisioning.
As the U.S. presidential election nears, we caught up with Nathaniel Gleicher, the former director of cybersecurity policy at the National Security Council in the White House. Gleicher, who is currently the head of Illumio's cybersecurity strategy, spoke with Information Security magazine about the Shadow Brokers' cyberweapons dump, the importance of having visibility into networks that need to be protected and the challenges of the vulnerabilities equities process.Continue Reading
As virtualization becomes more ubiquitous, users have greater access to system resources. However, this can lead to potential security issues. So what's an administrator to do? Continue Reading
The cost of a stolen mobile device is nothing compared to the value of lost data. To ensure mobile app security, IT should consider policies beyond mobile device management. Continue Reading
Manage Identity management & protection
Learn to apply best practices and optimize your operations.
The HR department is home to a plethora of employees' sensitive personally identifiable information. Here's how to make sure that valuable information stays safe. Continue Reading
IT admins need identity management tools to ensure network users are who they say they are. This applies to mobile users on an enterprise WLAN and the wired network itself. Continue Reading
Users see a false tradeoff between ease of access for users and IT governance and control in content management. Can identity management break the stalemate? Continue Reading
Problem Solve Identity management & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As public and private cloud services bring new IT security demands, data center teams need to rethink how they approach firewalls, identity management and more. Continue Reading
Many in health IT have pushed for a national patient identifier that could enable interoperability and data exchange in healthcare for a while now without much success and with much pushback from ... Continue Reading
Traditional security measures like password enforcement don't cut it when it comes to mobile devices. Instead, apply single sign-on technology to all in-house and external apps. Continue Reading