Results for IAM

Assess Your Security Posture: Incident Response is About Preparation and Addressing Risk

Earlier this fall, the Internet was brought to its knees by an army of Internet of Things devices. Given this successful attack on core Internet highways, can any stand-alone company expect to protect itself? How can businesses identify, combat and even predict threats? IDN speaks with IBM Security’s Peter Allor to get suggestions, insights -- and hope.

Full Story >

ForgeRock Says IoT is Pushing Security To Become ‘Password-Less’ and More Friction-Free

ForgeRock says it’s finally time to push ‘password-less’ security.  The company is adding push authentication to its identity platform to enable password-less login and frictionless second factor authentication – for devices and human users.

Full Story >

SailPoint Updates IdentityIQ To Enable Open 'Identity-Awareness' for Enterprise Security, IT Operations

Long-time identity and access management provider SailPoint is taking a bold step to make it easy for organizations to bring IAM into the fight against hackers and data breaches. SailPoint’s IdentityIQ 7.0 IAM platform is now designed to be more easily integrated with other elements of an organization operational and IT security infrastructure.

Full Story >

Centrify Continues To Update Identity Management for Big Data with NoSQL Support

As companies continue to embrace big data, all types of sensitive and regulated data are new high-value targets for hackers. In response, Centrify is optimizing the 4As of identity and access management – authentication, authorization, auditing and assurance – for Hadoop and NoSQL.

Full Story >

SailPoint Extends IAM To Govern Unstructured Data with Acquisition of Whitebox Security

SailPoint, a long-time identity and access management provider, is beefing up its ability to protect unstructured data with its acquisition of Whitebox Security and the WhiteOPS unstructured data governance solution.

Full Story >

Akana Boosts DevOps, Automation and Security for API Management; Focus on Mobile and IoT

In a sign that APIs are driving wider aspects of enterprise architecture, Akana Inc. has integrated capabilities for DevOps automation and enterprise-class identity management into its API management platform.

Full Story >

With Amazon API Gateway, AWS Opens a New Door on Backend Applications

Running applications for over a million customers in 190 countries, Amazon Web Services is hosting data and business logic in various back-end services, such as Amazon Elastic Compute Cloud (Amazon EC2) and AWS Lambda.

Full Story >

Dell Software's InTrust 11.0 Taps Vast Data Volumes To Delivers Real-Time Security, Alerts

Dell Software’s latest update to its InTrust analytics tool mines huge data volumes to help security teams stave off security threats and quickly discover suspicious trends and anomalies. IDN looks at InTrust 11.0 features.

Full Story >

From IAM to IaaS: How to Ensure Secure Deployments With the 4 A’s

This IDN guest post from David Gorton of Ping Identity illustrates how important the well-known ‘4As’ of access management [authentication, authorization, account management and auditing) are to ensuring that applications deployed into an IaaS will have the same level of security and functionality as apps left on-premises.

Full Story >

IBM's 'Summer of Security' Helps IT Assess, Combat Risks for the Extended Enterprise

IBM is coming off a busy “summer of security,” with rollouts of products, services, partnerships and acquisitions – all aimed at helping IT better identify, diagnose, combat and even predict risks from cloud, mobile and web initiatives. IDN explores IBM’s “summer of security” with Big Blue experts and execs.

Full Story >

Transitioning to Business-Focused IT: 4 Keys To Eliminating Shadow IT

Next-gen projects in mobile, cloud, big data and social are capturing more corporate attention -- and resources. As a result, savvy tech execs are taking new steps to balance the need for innovation with security and governance needs – and reduce the growth in Shadow IT. Ryan Ward, CISO at Avatier, shares some key tips for transitioning to ‘Business Focused IT’.

Full Story >

SOA Software’s OAuth Server Secures Sharing of Private Data with Cloud, Mobile Apps

SOA Software is shipping a comprehensive OAuth-based identity and access management solution to simplify security for the extended enterprise. OAuth Server lets IT allow users to use their current enterprise login credentials to access data from their partners’ mobile, cloud, API and desktop applications.

Full Story >

<< Start < Previous 1 2 Next > End >>
Showing 1 - 12 of 15