Category: News

CyberArk Engineer

Clango Careers
Apply Now!Send your resume and cover letter to today! Job Description: Clango, Inc. has an immediate opening for a CyberArk Certified Delivery Engineer (CCDE) who is seeking to broaden their skills while collaborating on a multifaceted Cybersecurity team. Initial duties will consist of installing, configuring and patching CyberArk installations for leading financial, healthcare, federal, and infrastructure clients. However,...

Senior Cybersecurity Systems Engineer

Clango Careers
Apply Now!Send your resume and cover letter to today! Clango has an immediate opening for a skilled systems administrator and network engineer with experience in or looking to move into cybersecurity engineering and architecture. This position is located in Arlington, VA, and will split time between internal security and engineering functions and client work in similar categories. The...

Authentication-as-a-Service Simplifies Single Sign-on and Access Controls

The cloud delivers many business benefits, including the ability to preserve capital, offload many IT operational tasks, implement new applications and services quickly, and tap into IT resources that might not otherwise be affordable. Thanks to these benefits, organizations are moving to the cloud in a big way. According to the RightScale 2017 State of the Cloud Report, the...

The Role of Identity Management in Healthcare Security

In our last post, we discussed some of the tech trends in healthcare that are having an impact on security. Beyond federal mandates for “meaningful use” of electronic health records (EHRs), healthcare organizations are employing technology tools to better engage with patients who expect to be treated more like customers. This is driving the adoption of monitoring devices, mobile...

Four Healthcare Tech Trends and Their Impact on Security

Though technology is typically viewed as a cost-saving and paper-reducing tool in the healthcare industry, there has been an increased emphasis on using technology to improve patient care and the overall patient experience. Federal law has mandated that healthcare organizations demonstrate “meaningful use” of electronic health records (EHRs) to better engage with patients and their families, coordinate care, and...

EAM: More than Reduced Maintenance Costs

Enterprise asset management (EAM) is generally used to reduce the operational and maintenance costs of corporate assets. By more effectively coordinating the maintenance of manufacturing plants, vehicle fleets, oil and gas pipelines, and other infrastructure, EAM can also help minimize costly service disruptions. However, the value of EAM can extend beyond the bottom line by enabling organizations to more...

NIST Offers New Guidelines on Identity Management

The National Institute of Standards and Technology (NIST) is updating its Cybersecurity Framework, as we reported in a previous post. Designed to provide a “prioritized, flexible, repeatable, performance-based and cost-effective approach” to managing cybersecurity, the framework has seen broad adoption by organizations worldwide. NIST issued a draft of version 2.0 in January 2017, incorporating feedback received since the original...

UMA Meets Privacy Requirements by Giving Customers Control Over Their Data

In our last post we discussed the growing need for customer identity and access management (CIAM) solutions. Like identity and access management (IAM), CIAM has to do with the registration and authentication of users so they can gain secure access to online resources. However, CIAM is also about the aggregation and synchronization of customer data across sales, marketing, and...

How CIAM Creates a 360-Degree View of the Customer

Healthcare IAM
Each of us has multiple identities — personal, consumer, business-related, etc. To his family, a man might simply be “Sam,” but to his employer, Sam is a complex array of user IDs, passwords, and access privileges. Identity and access management (IAM) provides a disciplined approach for the creation, maintenance, and use of those digital identities. It integrates business processes...

DIT is now Clango

Distributed Information Technologies, Inc. (DIT) is now Clango. We’ve changed our name, but you can still rely on us to help organizations build identity-centric security programs.  From DevOps and Cybersecurity to Application Development and Enterprise Asset Management, Clango delivers.