Network devices

Security strategy News

View All News

Security strategy Get Started

Bring yourself up to speed with our introductory content

  • Is your IAM policy a roadmap to security or leading you off a cliff?

    Identity and access management, or IAM, has long been a crucial consideration in the formulation of corporate security strategy. IAM policy today must contend with a variety of major changes sweeping the world of IT. One of the latest is the spread of cloud-based services, particularly the relativity new identity as a service. IDaaS and other products are having a significant impact on the market, as cloud-based IAM is now being released by both "establishment" players (i.e., Microsoft and Oracle) and next-gen companies like Ping Identity and Okta.

    This Information Security magazine Insider Edition tackles these seismic changes in the "identity layer" and considers other factors affecting IAM policy now and how they have an impact. In addition, we look at multifactor authentication, which is an established identity security practice. But multifactor is not without its own challenges when to comes to implementation and maintenance. We also take a careful look at the specific risks to cloud-based IAM tools, from shadow IT, mobility and more.

    Readers of the special edition of Information Security magazine on IAM policy and security concerns will come away better equipped to assess their current IAM policy and adapt it to the current and future world of IT.

     Continue Reading

  • An IT security strategy guide for CIOs

    In this Essential Guide, learn how to deal with increasing cyberthreats and discover best practices for developing a successful IT security strategy. Continue Reading

  • IoT and big data: Opportunities for the enterprise

    The combination of IoT and big data brings many opportunities to the enterprise, especially when it comes to boosting your security strategy. Continue Reading

View All Get Started

Evaluate Security strategy Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security strategy

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security strategy Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve