Advances in access governance strategy and technology
-
Article
Are biometrics the answer to secure authentication?
IT security has to be everywhere while hackers just need to find a single weak spot to do their damage. That’s why it makes sense to add the most advanced methods, like biometrics, to an enterprise's identity and access management strategy. Read Now
-
Photo Story
Using biometric authentication on mobile devices
Passwords and PINs aren't enough now to secure mobile. Enter biometrics, the best way now to secure authentication on mobile devices, though it's not without its drawbacks. View Now
-
Article
Is biometric security ready for corporate primetime?
Using biometrics for access governance in the enterprise presents some unique challenges. Can they be overcome? Read Now
-
Article
Security for applications: What tools and principles work?
Better app security requires both designing security in and protecting it from without. Learn how to work it from both angles and what tools you'll need for the job. Read Now
Editor's note
In IT security, access governance is all about reducing to the extent possible the risk that comes with end users, specifically the danger of excessive or unnecessary access privileges to systems and data. This includes the issue of setting strategy and policy to guide who has access to what; avoiding privilege creep; updating authentication processes; and keeping costs contained. The end goal is for the enterprise to put in place a secure authentication and access process -- and keep it up to date.
As the tools and methods evolve, an enterprise access governance system must also evolve. This guide looks at the parameters of identity and access management now, with an eye to keeping IT security pros updated on the latest developments in identity and access management.
1Au revoir, passwords; bon jour multifactor authentication
Keeping control over who has access to valuable and sensitive company data and systems demands moving past the username/password approach to IAM. Get up to speed on using multifactor authentication by reviewing these timely materials.
-
Article
Setting up two-factor authentication in the enterprise
Better access governance means moving away from the old username/password combo. See how 2FA advanced a secure authentication strategy Read Now
-
Article
Get up to date on two major advances in authentication
Considering biometric authentication? Or maybe multifactor? Learn the pros and cons of each and how they might be used in conjunction. Read Now
-
Video
It's time to move on from the password era of authentication
It's more critical than ever to IT security to keep tabs on who is accessing enterprise systems and data. Saying "hi" to truly secure authentication means saying "bye" to passwords. Watch Now
-
Article
Explore the knowledge factors that work best with mobile
Improved access governance can be achieved for mobile devices by using two-factor authentication methods and tools. But a key question is what knowledge factors will be most effective. Read Now
-
Article
Does a multifactor authentication app really work?
Multifactor authentication apps promise to up security on mobile devices but there are pros and cons to adding MFA to apps. Read Now
2Effective IAM strategy and advanced tech truly vital now
Desperate times calls for cutting-edge measures. Learn the many ways -- from the FIDO Alliance to the development of cryptographic keys -- those at the forefront of IT security are developing strategic means and advanced tech to protect company assets.
-
Article
FIDO, all grown up now and ready to work
There have been some frustrations in the creation and development of the FIDO Alliance but it can work well in any enterprise access governance strategy. Learn how. Read Now
-
Article
Time to modernize your approach to access governance
Most companies' identity and access strategies could use an update. Could yours? Read Now
-
Article
IAM systems get schooled by machine learning
Machine learning technologies are taking root in company IAM systems. What's the appeal? Can it really work and are there risks you need to be aware of? Read Now
-
Article
Identity federation management: The pros and the cons
In mobile, identity federation is fairly new tech. Which means it still has some challenges. Learn to deploy it painlessly. Read Now
-
Article
Move over password; here come cryptographic keys
The phishes have come for your password; secure authentication by switching to the use of cryptographic keys. Read Now