Why Cloud Identity Management for SMBs

Small-to-medium-sized businesses (SMBs) are viewed at large as the growth engine for the industries around them, and as such, are often called “the backbone of the economy.” SMBs generally drive where innovation starts these days, and they … Continue reading Why Cloud Identity Management for SMBs

Bring Order to Chaos By Building SIEM Use Cases, Standards, Baselining and Naming Conventions

Standards, baselines and naming conventions can remove barriers to threat detection and response and help security teams build effective SIEM use cases.

The post Bring Order to Chaos By Building SIEM Use Cases, Standards, Baselining and Naming Conventions appeared first on Security Intelligence.

Continue reading Bring Order to Chaos By Building SIEM Use Cases, Standards, Baselining and Naming Conventions

The Success of Your Business Depends on Your Security Culture

Given the historic data breaches, widespread vulnerabilities and onslaught of data privacy regulations that affected businesses around the world in 2018, security culture is more crucial than ever.

The post The Success of Your Business Depends on Your Security Culture appeared first on Security Intelligence.

Continue reading The Success of Your Business Depends on Your Security Culture

Identity and Access Management Capability Endpoint Management

Many IT admins don’t necessarily consider endpoint management a facet of identity and access management (IAM), but with systems representing the conduit between a user and his or her IT resources, it is critical to secure them. With that in mind,… Continue reading Identity and Access Management Capability Endpoint Management

Identity and Access Management Capability RADIUS Authentication

With the IT network shifting further away from wired connections and over to WiFi, there is a renewed focus on security and authentication services. Gone are the days of security by proxy—that is, security via a physical connection to the network… Continue reading Identity and Access Management Capability RADIUS Authentication

Identity and Access Management Capability RADIUS Authentication

With the IT network shifting further away from wired connections and over to WiFi, there is a renewed focus on security and authentication services. Gone are the days of security by proxy—that is, security via a physical connection to the network… Continue reading Identity and Access Management Capability RADIUS Authentication

Manage both O365™ & G Suite™

Is it possible to manage both Office 365™ (O365) and G Suite™ from a single platform? Ultimately, that depends on what exactly you’re trying to manage. For the most part, the answer is no, you will need to leverage the O365 and G Suit… Continue reading Manage both O365™ & G Suite™

Who Goes There? The Art of Digital Identity and Access Management

To connect the real world to the digital world, we can create digital identity models that represent a person with different attributes, characteristics and goals.

The post Who Goes There? The Art of Digital Identity and Access Management appeared first on Security Intelligence.

Continue reading Who Goes There? The Art of Digital Identity and Access Management

It’s Time to Dispel These Dangerous Password Security Myths

Passwords are bad, and alternatives abound. But first we need to overcome the common myths and misconceptions about the password.

The post It’s Time to Dispel These Dangerous Password Security Myths appeared first on Security Intelligence.

Continue reading It’s Time to Dispel These Dangerous Password Security Myths