Identity management & protection News
August 30, 2017
Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to attempt to explain how software application developers should approach identity as a key element ...
July 06, 2017
Ivanti acquires user environment management vendor RES Software for its automation and identity management tech. The deal follows Ivanti's 2016 deal for RES competitor AppSense.
June 28, 2017
An IT pro at Cloud Identity Summit shares his experience implementing identity management at the University of Oklahoma and describes what pitfalls to avoid.
February 24, 2017
The Cloudflare bug in CDN is fixed after causing sensitive customer data to leak. Google Project Zero discovered the flaw, and users were warned to change passwords.
Identity management & protection Get Started
Bring yourself up to speed with our introductory content
Mobile device use in healthcare has created new challenges for hospital IT. Using tools like mobile device management can help secure health data. Continue Reading
AWS security encompasses server tools and concepts. Enterprises that use the right services, VPCs, encryption and DevSecOps can avoid major gaffes that can expose valuable data. Continue Reading
IT admins need to have eyes in the back of their heads when it comes to keeping track of who is trying to access company data. That's where an ID management system comes in. Continue Reading
Evaluate Identity management & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Bringing new application types and integration points into the enterprise, cloud can complicate user identity management. So, how can you be sure your data is secure? Continue Reading
Digital IDs require an accurate, accessible and secure technology. Is blockchain the answer? Factom's Tiana Laurence explores the option. Continue Reading
The endpoint world is changing rapidly, and IT admins are running to keep up. Unified endpoint management could help them bring some order to the chaos. Continue Reading
Manage Identity management & protection
Learn to apply best practices and optimize your operations.
From single sign-on to two-factor authentication, many tools help secure enterprise content. But too much security can be a barrier to access. Continue Reading
As mobile security threats arise, the need for identity management systems becomes more and more crucial. The right tools help IT protect company data and users alike. Continue Reading
Don’t treat privacy compliance as drag n’ drop; take these steps to progress your IoT data privacy journey and get ready for your GDPR close-up. Continue Reading
Problem Solve Identity management & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The 'identity of things' alone won't solve IoT's security woes, but Micro Focus' Geoff Webb says it will significantly influence the IoT worldview. Continue Reading
As public and private cloud services bring new IT security demands, data center teams need to rethink how they approach firewalls, identity management and more. Continue Reading
Many in health IT have pushed for a national patient identifier that could enable interoperability and data exchange in healthcare for a while now without much success and with much pushback from ... Continue Reading