You searched for identity management/ | SC Media

Your search for identity management/ returned 113 results

Your search for identity management/ returned 113 results

Sort Results:

Relevant Recent
WebCast

Building a Better Identity Management Roadmap

The way organizations operate and process information has drastically changed over the last six months as the global economic and health crisis has resulted in job losses, an expanded remote workforce, and increased use of temporary staff. One important byproduct of this shift: Security leaders are rethinking their approaches to access control. Even in the best of circumstances, ensuring effective oversight of digital identities is among a security leader’s most daunting responsibilities. Innovations in contextual and biometric authentication remain promising — though the latter must confront increased social and legal resistance — but the growing complexity of internal and external networks we rely on keeps the bar high.
Product Review

Auth0

Auth0 is a cloud-based identity solution offering a universal authentication and authorization platform that protects the identities of all user types in any application. Traditional solutions with out-of-the-box features are secure but are often too rigid to accommodate the changing conditions and unique systems that application developers face. These developers create value through innovation, and…
Page

2020 SC Awards Trust Awards Finalists

Best Authentication Technology Cisco Systems ForgeRock Jumio RSA SecureAuth Best Business Continuity / Disaster Recovery SolutionArcserve Deloitte & Touche and Dell Technologies Onspring Quest Software Semperis Best Cloud Computing Security SolutionBitglassCentrifyCipherCloudIllumioMimecast Best Computer Forensic Solution AccessData – AD EnterpriseAccessData – Forensic Toolkit (FTK)EndaceOpenTextVectra Best Database Security Solution Baffle comforte AG Imperva MarkLogicPenta Security Systems Best…
Page

SC Media Reboot Leadership Awards – Top Managers

Lorelei Chernyshov, Merrick Bank Driven by impending changes wrought by new regulations such as GDPR and the California Consumer Privacy Act (CCPA), Lorelei Cheryshov has focused on leading the integration of information assets with cybersecurity practices to better manage sensitive data location, accessibility and storage at Merrick Bank. Complete Profile… Kevin von Keyserling, Keyfactor Since…
Group Test

June 2020: Identity & Access Management

This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The traditional, known perimeter has grown increasingly immaterial over the years. The unprecedented, world-wide scramble to work remotely has emphasized that the previously…
Reboot Leadership Awards 2019

Roger Grimes – KnowBe4

Why Nominated: Roger Grimes is a 30-year computer security professional and prolific author frequently consults with the world’s largest and smallest companies and militaries. Profile: In his role as an advocate, Roger Grimes spreads his message on the importance of cybersecurity to the community at conferences such as RSA, Black Hat, Tech Mentor, Tech Ed, SecTOR, AusCERT…
About Reviews, Group Tests, Product News, Reviews, Security News

SC Product Reviews: Identity & Access Management

This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The traditional, known perimeter has grown increasingly immaterial over the years. The unprecedented, world-wide scramble to work remotely has emphasized that the previously…
Executive Insight, Opinion

A new way to think about security in autonomous systems: Don’t

The age of autonomy is upon us. While talk of autonomous cars in the not-too-distant future captures the imagination, the reality is that autonomous systems are very much with us in the present day. We see it in the robots that are packing parcels in an online retailer’s warehouse, or welding car parts on an…
WebCast

Identity and Access Management for our New Remote Workforce

In this upcoming SC Media virtual conference, we look at these challenges as well as explore not only more traditional approaches, but also IAM-as-a-service, more up-and-coming solutions in what Gartner is calling Identity Analytics (founded more on risk-based methods versus a reliance on static rules), and more. We also get advice on the preparation, management…