Identity Management

Authentication Your Way: Have Your Security and Convenience, Too

Your diverse, dynamic user base demands fast, convenient authentication and access—no matter where they are or what devices they are using. But you need authentication to be secure above all, with visibility across all applications and resources (cloud to ground),the assurance that your users are who they say they are and entitled to the access…

Answering the #1 Question in Identity Management

Takeaways from a Recent Identity Survey by IDG It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in…

A Tale of One Password and Unhappily Ever After for Retailers

Do you recycle? I’m not talking here about paper, glass and aluminum waste. I mean online passwords.  For most consumers, password recycling is a given which exposes them to a wide variety of other identity theft risks.  However, poor identity management practices on the part of consumers also puts retailers and e-commerce merchants at risk…

Renewed Impetus for Identity Management

Security incidents are providing renewed impetus for the identity management technology market. The number of breaches in 2014 hit an all-time high, with 27.5 percent more than 2013 in the U.S. alone, according to the Identity Theft Resource Center (ITRC). Since 2005, more than 5,000 breaches have been reported with 675 million records exposed. In…

Making Permission (and Access) Easier Than Users Begging for Forgiveness

Organizations frustrate authorized users when it comes to controlling and allowing access to enterprise resources and applications, wherever they may reside. This user frustration has slowed business productivity, created dangerous security risks and vulnerabilities, and allowed incredibly costly hacks, threats, and intrusions. Today, while we have powerful mobile devices able to remotely access data-filled applications…

How to Tame the Digital Pitchfork Mob and Harmonize Your Identity Management

There’s nothing like a little login frustration to turn users against their IT gatekeepers, storming the help desk with their digital pitchforks and torches. People expect simplicity, ease-of-use and flexibility when accessing workplace resources. Whether they bring in their own devices, use personal apps for company work, or look for unfussy access to corporate resources while…

Keep Criminals from Shopping for Identities

Retail data breaches continue to expose retailers to significant losses, both tangible and intangible, including loss of customer data, loss of customer trust, and brand erosion. There are a lot of security-related risks for any organization, but these risks are especially true for retail organizations, who depend on strong, lasting customer relationships to survive and…

A New Lens on Provisioning

Call me old-fashioned, but I’ve always been someone who appreciates the “originals” over the latest new fad. Vinyl records carry a charm that .mp3s can never replicate, the satisfaction of turning a tangible page can’t be done in an electronic book, and the joy of a human “hello” will always beat a digital “<emoji> #letshang.”…

Stephen Colbert and the Ring of Steel

Believe it or not, the “Colbert Report” has been a Comedy Central mainstay for nearly a decade.   For me, it was a staple of weekday college nights, one that offered a refreshing (and often hilarious) take on the news stories we all-too-serious journalism majors spent five days a week over analyzing.   Keeping up with current…