Category: News

Why the IoT Needs IAM, Part 1: Rise of the Botnets

Clango
In the Internet of Things (IoT), billions of connected objects quietly collect and transmit data and perform a wide range of functions, generally without human intervention. Imagine vending machines that tell you when they need to be replenished, vehicles that schedule their own maintenance, and “smart home” products that let you lock your doors, control your thermostat, and peek...

Why Does Identity and Access Management / Governance Matter?

IAM
The risks associated with insider-threat theft and data breaches are well known. At the very least we ought to be aware of who is currently able to access our information resources and operational controls. We need to understand the risks to the enterprise if information or access falls into the wrong hands, or is corrupted in some way. Whatever...

How Enterprise Asset Management Helps Enable Digital Transformation

MaxFactory
At the end of every year, IT industry analysts and research firms try to predict which technology trends will have the greatest impact in the coming months. Some of the top picks for 2017 include artificial intelligence and machine learning, augmented and virtual reality, 3-D printing, Blockchain, and wearables. Meanwhile, cloud computing will continue to grow unabated, and billions...

The Intersection of Identity Management and Physical Security

IAM
Most people think of identity management as a tool for enhancing the security of systems, applications, networks, and data. By effectively managing user credentials, organizations can maintain strict control over access to IT resources and gain greater visibility into user behavior that could present a security threat. However, identity management can also play a role in strengthening physical security,...

Why Is Endpoint Security Important?

TJ
According to Panda Labs, more than 4,000 ransomware attacks occurred in 2016, and 18 million new malware samples were collected in Q3 of 2016. Experts predict that these numbers will be even higher for 2017. What do most, if not all, of these attacks have in common? They all start on an endpoint of some kind: a PC, laptop,...

How Do We Gain Total Access Visibility Across the Enterprise?

Ray Brisbane
Previously, we asked this question: Who has access to what, why, and who approved it? Our answer was to establish an integrated enterprise identity and access management (IAM) platform. The basic IAM components are fairly straightforward. Establishing the platform starts with maintaining a list of the identities that will need access to resources (systems, services, applications, information, and controls)...

Why Identity Governance Must Be a Top Priority as EU Privacy Deadline Looms

Latest News
Any organization that controls or processes data on consumers in the European Union (EU) will soon be required to comply with the General Data Protection Regulation (GDPR). The new law, which goes into effect May 25, 2018, is expected to have a sweeping impact on the data protection and privacy practices of companies worldwide. Those organizations that aren’t fully...

Using KPIs to Redefine IAM Success, Part 2

IAM
In part 1 of our series on Using KPIs to Redefine IAM Success, we began talking about why identity management projects fail — or at least why they are perceived to have failed. In most instances, organizations adopt identity management solutions to reduce the risk of unauthorized access to systems and data. However, criteria such as operational complexity and...

Why IAM Is Often Put on the Back Burner and Why It Shouldn’t Be

Kabir
So, you’ve just been breached. Now what? Many questions come to mind. Is the breach contained? Who was behind it? Were they internal or external? How did they get in? What did they get? Depending on your organization’s level of sophistication in response to such incidents, a number of processes, controls, and workflows will be initiated and checked. Some...

Who Has Access to What, Why, and Who Approved It?

Ray
Identity management (IdM) is an essential discipline in today’s increasingly complex information and operational technology environments. Organizations must efficiently provide secure and compliant access to large numbers of users across more systems and applications than ever – and at the same time be able to state accurately who has access to which systems and who granted that access. Additionally,...