Authentication-as-a-Service Simplifies Single Sign-on and Access Controls

The cloud delivers many business benefits, including the ability to preserve capital, offload many IT operational tasks, implement new applications and services quickly, and tap into IT resources that might not otherwise be affordable. Thanks to these benefits, organizations are moving to the cloud in a big way. According to the RightScale 2017 State of the Cloud Report, the...

The Role of Identity Management in Healthcare Security

In our last post, we discussed some of the tech trends in healthcare that are having an impact on security. Beyond federal mandates for “meaningful use” of electronic health records (EHRs), healthcare organizations are employing technology tools to better engage with patients who expect to be treated more like customers. This is driving the adoption of monitoring devices, mobile...

Four Healthcare Tech Trends and Their Impact on Security

Though technology is typically viewed as a cost-saving and paper-reducing tool in the healthcare industry, there has been an increased emphasis on using technology to improve patient care and the overall patient experience. Federal law has mandated that healthcare organizations demonstrate “meaningful use” of electronic health records (EHRs) to better engage with patients and their families, coordinate care, and...

EAM: More than Reduced Maintenance Costs

Enterprise asset management (EAM) is generally used to reduce the operational and maintenance costs of corporate assets. By more effectively coordinating the maintenance of manufacturing plants, vehicle fleets, oil and gas pipelines, and other infrastructure, EAM can also help minimize costly service disruptions. However, the value of EAM can extend beyond the bottom line by enabling organizations to more...

NIST Offers New Guidelines on Identity Management

The National Institute of Standards and Technology (NIST) is updating its Cybersecurity Framework, as we reported in a previous post. Designed to provide a “prioritized, flexible, repeatable, performance-based and cost-effective approach” to managing cybersecurity, the framework has seen broad adoption by organizations worldwide. NIST issued a draft of version 2.0 in January 2017, incorporating feedback received since the original...

UMA Meets Privacy Requirements by Giving Customers Control Over Their Data

In our last post we discussed the growing need for customer identity and access management (CIAM) solutions. Like identity and access management (IAM), CIAM has to do with the registration and authentication of users so they can gain secure access to online resources. However, CIAM is also about the aggregation and synchronization of customer data across sales, marketing, and...

How CIAM Creates a 360-Degree View of the Customer

Healthcare IAM
Each of us has multiple identities — personal, consumer, business-related, etc. To his family, a man might simply be “Sam,” but to his employer, Sam is a complex array of user IDs, passwords, and access privileges. Identity and access management (IAM) provides a disciplined approach for the creation, maintenance, and use of those digital identities. It integrates business processes...

DIT is now Clango

Distributed Information Technologies, Inc. (DIT) is now Clango. We’ve changed our name, but you can still rely on us to help organizations build identity-centric security programs.  From DevOps and Cybersecurity to Application Development and Enterprise Asset Management, Clango delivers.

NIST Cybersecurity Framework Gets an Update

Organizations are facing a “triple threat” when it comes to cybersecurity. Growing numbers of vulnerabilities and increasingly sophisticated attacks have made cybersecurity breaches virtually inevitable. However, many organizations lack the skilled personnel needed to combat these attacks, and open positions for security specialists tend to go unfilled due to the limited number of professionals in the marketplace. As a...

FIDO Alliance Specifications Enable Standards-Based Approach to MFA

In our last post, we discussed how so-called “aftershock” attacks are driving the need for multifactor authentication (MFA). Because most users rely on a handful of slightly varied passwords to access multiple sites and accounts, cybercriminals often use stolen passwords in hacking attempts. MFA adds an extra layer of protection by requiring more than a password for authentication. Traditionally,...