Results for Authentication

Four Ways To Adapt Your Security for Digital Transformation – And Keep Pace with the Speed of Business

News of the Verizon data breach is just the latest reminder of how tough it is for CIOs and CISOs to balance ‘security’ vs ‘innovation’ in the age of digital transformation and hybrid (borderless) architectures.  One Identity’s Todd Peterson shares 4 proven strategies for how security professionals can be responsive to business initiatives -- without compromising on security needs. 

Full Story >

Centrify Analytics Service Uses Machine Learning and User Behavior To Stop Breaches in Real Time

A Forrester Research study, commissioned by security firm Centrify, estimates 1 billion identities were compromised in 2016.  The firm is also launching Centrify Analytics Service to shore up access protection with real-time analytics and machine learning.

Full Story >

ForgeRock Says IoT is Pushing Security To Become ‘Password-Less’ and More Friction-Free

ForgeRock says it’s finally time to push ‘password-less’ security.  The company is adding push authentication to its identity platform to enable password-less login and frictionless second factor authentication – for devices and human users.

Full Story >

Identity Gets Boost as ‘DNA’ for Digital Enterprise Security: Top Takeways from Ping’s Cloud Identity Summit

Could identity become the DNA for delivering agile, strong, and situational security solutions for the new-gen digital enterprise?   A growing number of security execs see the possibilities. IDN looks at the Cloud Identity Summit with execs from Ping Identity.

Full Story >

Centrify Focuses on Mobile Security; Ships ‘Derived Credentials’ and Partners with BlackBerry’s Good Mobility

Centrify has cracked the code on a vexing problem for mobile users that need ultra-tight security, especially those in the government or highly-regulated environments.  Thanks to Centrify's approach to ‘derived credentials,’ it offers smart card, 2-factor authentication.

Full Story >

Centrify Continues To Update Identity Management for Big Data with NoSQL Support

As companies continue to embrace big data, all types of sensitive and regulated data are new high-value targets for hackers. In response, Centrify is optimizing the 4As of identity and access management – authentication, authorization, auditing and assurance – for Hadoop and NoSQL.

Full Story >

Ping’s ‘Identity Defined Security’ Initiative Aims To Protect Mobile, APIs and IoT Projects

Ping Identity is delivering on its position that identity will be the best way to deliver security to the growing wave of extended enterprise use cases, including mobile, cloud and event IoT. IDN reviews components of Ping’s ‘Identity Defined Security’ initiative.

Full Story >

Citrix XenMobile 10 Improves Mobile Experience for IT and End Users

Citrix is updating its long-standing XenMobile EMM with a new architecture to deliver better mobile user experience – for both IT and end users. XenMobile 10 offers streamlined workflows, simplified deployment, easier end-to-end management and even user self-service.

Full Story >

From IAM to IaaS: How to Ensure Secure Deployments With the 4 A’s

This IDN guest post from David Gorton of Ping Identity illustrates how important the well-known ‘4As’ of access management [authentication, authorization, account management and auditing) are to ensuring that applications deployed into an IaaS will have the same level of security and functionality as apps left on-premises.

Full Story >

Cloud Security, Identity Solutions Heat Up The Summer

At Black Hat 2014, the best cloud security experts warned that spoofs, hacks, phishes and bots continue to pose risks for public and private cloud projects. With these threats in mind, IDN showcases companies that are moving to plug these cloud security gaps.

Full Story >

Dell SonicWall Adds ‘Context-Aware’ Security, Access Control for Enterprise Mobility

To help IT better ensuring the security of corporate data and apps. Dell is shipping an update to its SonicWall secure access gateway with features optimized for BYOD and mobile security and access control. The latest version can secure an employee’s mobile access to data and apps, whether they use managed or unmanaged devices.

Full Story >

MapR Boosts Hadoop’s ‘Out-of-the-Box’ Security with Native Authentication, Authorization

MapR Technologies’ latest effort to enrich Hadoop with out-of-the-box enterprise features focuses on security. To make securing big data easier and more reliable MapR has natively integrated authentication and authorization into the beta of its MapR Distribution for Apache Hadoop. IDN speaks with MapR’s Jack Norris.

Full Story >

<< Start < Previous 1 2 3 Next > End >>
Showing 1 - 12 of 26