KuppingerCole Report Reveals Tremendous Growth in Interest of Web Access Management and Identity Federation A recent KuppingerCole report for web access management and identity federation called out IBM Security Access Manager as a leader in the space.
Children’s Health Care, Patient Records and Black Market Identity Theft Children's hospitals often fall victim to black market identity theft because their primary goal is treating patients — data security is secondary.
The Insider Threat: Are You at Risk? Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat.
IDaaS: Life Before and After Cloud IAM A security expert spoke to Security Intelligence regarding how cloud IAM quickly solves common identity and access management problems.
Not All Heroes Wear Capes: How IAM Can Save You From Your Next Data Breach Identity and access management solutions that incorporate risk-based controls can help organizations avoid a potentially harmful data breach.
What Is IDaaS? A CISO Clears Up Confusion Around the Definition of Cloud IAM In an interview, one chief information security officer provides a clear definition of IDaaS, or cloud-based identity and access management.
Access Controls and the Inability to Keep Up The mindset of prescribing one-dimensional access controls hasn't been effective, so enterprises are now shifting toward end-to-end controls.