Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on […]

The post Why Your Success Depends on Your IAM Capability appeared first on Security Intelligence.

Continue reading Why Your Success Depends on Your IAM Capability

Securing Cloud Technology in a Growing Threat Landscape

Cloud technologies are becoming more and more popular. Many companies shifted their workloads and their IT infrastructures into the cloud. The advantages are clear: more flexibility and scalability, less admin overhead and often cost savings. But with those advantages also come many risks. Recent studies have shown several threats cloud technologies face. As data transfers […]

The post Securing Cloud Technology in a Growing Threat Landscape appeared first on Security Intelligence.

Continue reading Securing Cloud Technology in a Growing Threat Landscape

Integrating IAM and SIEM to Boost Event and Anomaly Detection

Sending information from your identity and access management (IAM) system to your security information and event management (SIEM) system can help you to find events and anomalies that you might not find otherwise. This can help you detect that an attacker has breached your systems. Your SIEM system might already be collecting a lot of […]

The post Integrating IAM and SIEM to Boost Event and Anomaly Detection appeared first on Security Intelligence.

Continue reading Integrating IAM and SIEM to Boost Event and Anomaly Detection

Identity Fraud: 9 Consumer Scams (and How to Stop Them)

With remote work, e-commerce activity and sophisticated breach capabilities at an all-time high, there is a perfect storm brewing. Identity fraud is not going away anytime soon.  Take a look at nine common types of identity fraud, the warning signs and some identity management advice. This way, you can reduce the risk of falling victim […]

The post Identity Fraud: 9 Consumer Scams (and How to Stop Them) appeared first on Security Intelligence.

Continue reading Identity Fraud: 9 Consumer Scams (and How to Stop Them)

Compromised Cloud Costs Orgs $6.2 Million Annually

Compromised cloud accounts cost companies an average of $6.2 million each year according to the Ponemon Institute, and more than two-thirds of professionals said the compromised accounts represented a “significant security risk” to their c… Continue reading Compromised Cloud Costs Orgs $6.2 Million Annually

Can Google Cloud IAM Be Used as a Directory?

Google® has recently introduced a new solution to their Cloud Platform. The solution is called Google Cloud Identity and Access Management (IAM), and it is currently in the beta stage. Because of its novelty, many IT admins are wondering what the … Continue reading Can Google Cloud IAM Be Used as a Directory?

Achieving ISO/IEC 27001 Certification with JumpCloud

Compliance. It’s a word that can send chills down anyone’s spine, especially that of an IT admin. The International Organization of Standardization/International Electrotechnical Commision (ISO/IEC) 27001 is the holy grail when it comes to … Continue reading Achieving ISO/IEC 27001 Certification with JumpCloud

What is an Identity Cloud?

A new term is being thrown around in the IT management world—identity cloud. But, what is an identity cloud, and how can it help you and your organization? With the advent of modern microservices, the concept of an identity cloud is quite interes… Continue reading What is an Identity Cloud?

IAM Function Cloud User Management

In the past, IT environments were on-prem and largely based on one type of provider and platform. Identity and access management (IAM) tools were created with this in mind, and user management was straightforward. Now, there is a flood of web-based app… Continue reading IAM Function Cloud User Management