I’m pleased to announce that Identity Automation was acknowledged as an Honorable Mention in Gartner’s 2019 Magic Quadrant for Identity Governance and Administration (IGA).
I’m pleased to announce that Identity Automation was acknowledged as an Honorable Mention in Gartner’s 2019 Magic Quadrant for Identity Governance and Administration (IGA).
In terms of the traditional security structure, the cloud has changed everything— its pushed the perimeter boundaries outside the organization’s four walls. With the soft perimeter of a hybrid environment, comes the complexity of additional tools and analytics that are needed to achieve the same level of visibility as with traditional edge security devices.
Access Management (AM), Identity Management, Identity and Access Management (IAM), and Privileged Access Management (PAM): while these terms use similar language and act to strengthen an organization’s security posture, they each have separate and distinct meanings.
Recently, we discussed delegated administration, a robust tenet of modern Identity and Access Management (IAM).
The amount of coverage and attention the General Data Protection Regulation (GDPR) received leading up to May 2018 was intense to say the least. But even now, more than a year since that date has come and gone, organizations across the world are still either unsure or mistaken about whether they are compliant—and how to become so.
Often times, healthcare organizations have point solutions to address critical areas, but are still concerned about their broader security needs.
One of the most powerful tenants of any modern Identity and Access Management (IAM) system, and arguably a necessary foundational layer from a security perspective, is Identity Lifecycle Management (ILM).
As learning environments steadily move toward digital curriculum, protecting student data privacy becomes more and more critical.
Recently, we packed our bags and traveled to the scenic village of Lake Placid, New York for the 2019 State University of New York (SUNY) Technology Conference.
One of the most powerful features of any modern identity and access management (IAM) solution is delegated administration. This core feature gives business users of an organization the ability to perform basic IT functions, such as new account creation, role and group assignment, and access requests, all without the capabilities and permissions typically tied to a privileged IT role.
current_page_num+2: 4 -