Why identity management will improve the customer experience
David Gee imagines a world with a single, secure identity management solution that provides trust and control.
David Gee imagines a world with a single, secure identity management solution that provides trust and control.
<a href="http://gurucul.com/">Gurucul</a> is extending its identity-based threat detection to cloud-based applications with a new platform that monitors who has access to what and what they are doing with it.
Microsoft's strategy for providing customers with identity management options is increasingly reliant on cloud-based methods of authentication and access control for provisioning of Windows-based mobile devices as well as Apple iOS and Google Android devices.
Although a mining pool last month managed to briefly control the majority of the computing power used to generate the Bitcoin crypto-currency, a so-called '51 per cent attack' remains unlikely.
After acquiring mobile application management company Bitzer Mobile late last year, Oracle today announced that it has taken Bitzer's basic "container" technology for Apple ioS and Google Android and linked it to identity management.
Securing a hybrid cloud is not the same thing as deploying hybrid security products.
Two major identity management companies are forging ahead with products designed to satisfy what a cloud-computing consortium calls one of the trickiest problems preventing secure and automated connections between internal IT infrastructures and external service providers: identity and authentication.
After posting 5 Free Ways to Track Online Leaks of Information, I received numerous requests asking how to identify the online source leaking the confidential company information. Here are some techniques a corporate investigator can use to identify anonymous users online.
Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.
Cloud, identity management and enterprise mobility technologies can provide significant benefits for business efficiency and promote a collaborative workforce. However, it can often result in conflicts of interests between business heads and IT leaders, both who have different concerns and expectations on how to implement these solutions to benefit the company. <p> This whitepaper looks at how a collaborative approach can benefit both IT and business stakeholders, resulting in increased business flexibility and security. Included in this whitepaper are also 5 step by step considerations for both business and IT leaders to reap the benefits of these platforms by adopting synergistic strategies.