The Cloud Security Alliance is talking up a new security concern for IT pros to worry about, "Shadow Access," or the unintended access to organizational applications and data. "The consequences of ...
As technology and cyber threats evolve, managing and protecting user identities across many systems, platforms and devices is becoming more and more difficult. Many companies already understand the ...
Stack Identity’s patent-pending algorithm detects and eliminates unauthorized, invisible shadow access to prevent cloud data breaches WestWave Capital and Benhamou Global Ventures co-led the seed ...
BURLINGTON, Ontario, July 9, 2013 /PRNewswire/ -- N8 Identity, Canada's leading dedicated identity and access management (IAM) solution provider, today announced eight tips for proactive compliance ...
Connectivity to enterprise data spurred by the mobile and cloud movements have not only helped organizations put their employees in touch with business-critical data that improves the way they work, ...
Cloud and mobility are exacerbating problems in an already-fragile IAM infrastructure. This will drive changes to areas such as single sign-on, multi-factor authentication, IAM centralization, and ...
GUEST OPINION: Cybercriminals are constantly on the hunt for new ways to gain access to corporate IT infrastructures. Increasingly, their targets of choice are identity and privilege. They are ...
In today’s data-driven world, CEOs face a constant barrage of metrics. Revenue figures, customer satisfaction scores and website traffic—they all paint a picture of our company's health. But there's ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results