Identity management and access controls News
December 20, 2016
Westcon-Comstor, a valued-added distributor, has inked a deal with BeyondTrust, an information security vendor that provides a privileged access management platform.
December 12, 2016
Executives from One Identity, which operates under Quest Software, discuss the company's renewed focus on the channel.
August 17, 2016
A PGP short ID collision attack on the creator of Linux brings to light a flaw that experts have known about for years with short ID keys.
July 26, 2016
America's National Institute for Standards and Technology is advising the deprecation of using SMS-based two-factor authentication in order to improve security.
Identity management and access controls Get Started
Bring yourself up to speed with our introductory content
Your organization needs to make decisions about its IAM strategy in order to keep up with the new technologies its deploying. Steps to take begin at the policy level. Continue Reading
Revise your enterprise's IAM strategy for better integration with emerging technologies, such as cloud services and software-defined everything. Expert Johna Till Johnson explains. Continue Reading
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Identity management and access controls Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Identity management is a core component of cybersecurity readiness, but there are many layers and complexities behind it. Expert Peter Sullivan explains the basics of IAM. Continue Reading
Single sign-on continues to be the main driver for cloud identity and access management systems, but BYOD and shadow IT bring new challenges for these tools to solve. Continue Reading
Your IAM infrastructure should cut through the 'access excess' that is plaguing most companies. Learn how to overcome the challenges posed by migration to cloud and mobility. Continue Reading
Manage Identity management and access controls
Learn to apply best practices and optimize your operations.
Users with privileged accounts have the ability to make critical changes to your enterprise system. Find out how to control trusted users and prevent malicious actions. Continue Reading
Maintaining the security principle of least privilege can prevent abuse of privileged user accounts. Learn about the best practices for monitoring privileged access. Continue Reading
Privilege creep can result in the abuse of user access and security incidents. Expert Michael Cobb explains how enterprises can keep user roles and privileges aligned. Continue Reading
Problem Solve Identity management and access controls Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading
A bad password brings unnecessary risk into organizations, but how bad are they really? Expert Randall Gamby assesses just how dire the situation is. Continue Reading
Is it smart for infosec teams to push for integration of logical and physical access control systems? Learn how to make the case and where to start. Continue Reading