Windows 8

Identity management & protection News

  • October 06, 2016 06 Oct'16

    Workspace suites 'take a load off' IT

    Organizations that want to simplify device management and access are interested in workspace suites, such as VMware Workspace One.

  • August 18, 2016 18 Aug'16

    Now that Verify has lost its head, will the corpse be decently buried?

    With the departure of its most articulate champion Verify now appears dead. But Brexit means that HMG needs an effective and consistant identity policy more than ever. Has the time finally come to ...

  • August 17, 2016 17 Aug'16

    Will GDS see another mass exodus?

    Yesterday saw the departure of another senior figure at the Government Digital Service (GDS) as Verify director Janet Hughes announced she is leaving. The news, which came only weeks after ...

  • June 30, 2016 30 Jun'16

    The healthcare industry is making it far too easy for hackers

    Hospitals and healthcare organizations are far too vulnerable to cyberattacks, and a recent healthcare security study shows the issue isn't just outdated legacy technology -- medical professionals ...

View All News

Identity management & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Identity management & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Identity of things moves beyond manufacturing

    With more employees bringing their own devices and network-connected objects -- such as keycard controls and energy monitoring systems -- the digital footprint of the internet of things is only increasing. Yet the security industry is starting to develop an identity of things strategy.

    Manufacturing, healthcare and critical-infrastructure companies have long dealt with the identity of things. Supervisory control and data acquisition engineers may be able to teach CIOs and CISOs the best way to handle device identity management. Determining which devices should access a network is a daunting task, however, because device identity management can be context dependent. Some, such as mobile phones, should be linked to users; others, such as radio frequency ID tags on cargo containers, should be linked to physical objects; and still others, such as an MRI machine or a centrifuge, need to be treated as a critical asset. To deal with the influx of devices and the identity of things, companies need to address discovery, asset identification and provisioning.

    As the U.S. presidential election nears, we caught up with Nathaniel Gleicher, the former director of cybersecurity policy at the National Security Council in the White House. Gleicher, who is currently the head of Illumio's cybersecurity strategy, spoke with Information Security magazine about the Shadow Brokers' cyberweapons dump, the importance of having visibility into networks that need to be protected and the challenges of the vulnerabilities equities process.

     Continue Reading

  • Restrict access to system resources with VMware Identity Manager

    As virtualization becomes more ubiquitous, users have greater access to system resources. However, this can lead to potential security issues. So what's an administrator to do? Continue Reading

  • Five ways to boost mobile application security

    The cost of a stolen mobile device is nothing compared to the value of lost data. To ensure mobile app security, IT should consider policies beyond mobile device management. Continue Reading

View All Evaluate

Manage Identity management & protection

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Identity management & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve