source identity

Results 1 - 17 of 17Sort Results By: Published Date | Title | Company Name
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: LifeLock     Published Date: Jul 31, 2012
With LifeLock® identity theft protection as part of your employee benefits package, you can differentiate your company from your competition and better retain top employees.
Tags : 
lifelock, human resources, identity protection, benefits, solutions, business issues and trends, global hr management, human resources management, management fundamentals
    
LifeLock
Published By: Rackspace     Published Date: May 28, 2019
Getting started with Microsoft Azure can be easier than you imagine – Rackspace is a seasoned cloud management partner of myriad customers around the world. Pooling its depth of cloud experience with its expertise across all the major cloud platforms, Rackspace sieves out the proven steps to help IT teams adopt Azure cloud in lowering costs, more strategic use of IT resources and a competitive edge. To get started with Microsoft Azure, check out this white paper for coverage of the essentials, from planning and budgeting to choosing the best strategy to secure your cloud environment, in seven critical steps: 1. Don’t start with a production workload 2. Consider any corporate policies and compliance issues 3. Define your goals for the cloud 4. Calculate your financial return on Azure 5. Determine your cloud identity strategy 6. Consider how to secure your cloud environment 7. Realize it’s not as easy as it looks
Tags : 
azure workloads, security, compliance, infrastructure, iaas, paas, saas
    
Rackspace
Published By: Rackspace     Published Date: May 28, 2019
Getting started with Microsoft Azure can be easier than you imagine – Rackspace is a seasoned cloud management partner of myriad customers around the world. Pooling its depth of cloud experience with its expertise across all the major cloud platforms, Rackspace sieves out the proven steps to help IT teams adopt Azure cloud in lowering costs, more strategic use of IT resources and a competitive edge. To get started with Microsoft Azure, check out this white paper for coverage of the essentials, from planning and budgeting to choosing the best strategy to secure your cloud environment, in seven critical steps: 1. Don’t start with a production workload 2. Consider any corporate policies and compliance issues 3. Define your goals for the cloud 4. Calculate your financial return on Azure 5. Determine your cloud identity strategy 6. Consider how to secure your cloud environment 7. Realize it’s not as easy as it looks
Tags : 
    
Rackspace
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction, in-house directories, management challenges, cloud-based services, b2b, b2c, cloud services, it applications, source of identity, bring your own identity, iam-as-a-service, security, business activity monitoring
    
CA Technologies
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management, business analytics, business management
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
    
OneLogin
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : 
identity governance, iam, identity management, user-centric security
    
SailPoint Technologies
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: Okta APAC     Published Date: Dec 19, 2018
Multifactor authentication (MFA) is a critical security requirement for every organization, regardless of size and industry. But not every MFA solution is created equal. Your investment in MFA should be well-thought-out. Not only does your chosen MFA solution need to meet the requirements you have today, but it needs to enable and secure the future growth and evolution of your business. This evaluation guide will help you understand the key factors you need to consider when investing in MFA. Your MFA choice determines how well you can protect access to all your internal resources, as well as your ability to provide frictionless experiences for your internal employees and external customers. Your MFA choice also impacts your ability to grow your business and take advantage of emerging technologies and future innovations. As part of Okta’s identity-led security framework, Okta Adaptive MFA delivers on the key considerations that need to be part of your search for a solution that meets a
Tags : 
    
Okta APAC
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation
Published By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : 
ibm, blockchain, electronics
    
IBM
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, security, it management, knowledge management, data management
    
IBM
Published By: IDFocus     Published Date: Aug 21, 2009
HRFeed is one of the most critical elements of every Identity Management or User Provisioning solution. This document outlines the different business and technical challenges that IDFocus faced when building successful HR-to-Provisioning integration for several clients.
Tags : 
identity management, human resources, hrfeed, identity management, user provisioning, system integration, idfocus, password management
    
IDFocus
Published By: Meet My Brand Tryvertising Agency     Published Date: Nov 13, 2010
Strategies Using Human Resource Executives for Brand Identity
Tags : 
branding, brand identity, marketing, social media, social marketing, product placement, advertising
    
Meet My Brand Tryvertising Agency
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.