Gartner IAM Summit and Upcoming Webinars Highlight Identity Governance and Intelligence

IBM Security will showcase its identity governance and intelligence solution at the upcoming 2016 Gartner IAM Summit, and during two webinars in December.

The post Gartner IAM Summit and Upcoming Webinars Highlight Identity Governance and Intelligence appeared first on Security Intelligence.

Continue reading Gartner IAM Summit and Upcoming Webinars Highlight Identity Governance and Intelligence

The Next Wave of Identity Management Must Meet the Goal of One True Identity

The third wave of the internet requires an approach to identity management that recognizes the need to share PII selectively to maximize its value.

The post The Next Wave of Identity Management Must Meet the Goal of One True Identity appeared first on Security Intelligence.

Continue reading The Next Wave of Identity Management Must Meet the Goal of One True Identity

New Security Enhancements for Microsoft Windows Server 2016

Windows Server 2016 includes enhanced security features, such as VM encryption capabilities and a minimal Nano Server to reduce the attack surface.

The post New Security Enhancements for Microsoft Windows Server 2016 appeared first on Security Intelligence.

Continue reading New Security Enhancements for Microsoft Windows Server 2016

Gartner IAM Summit 2016: Your Ultimate Guide to Must-Attend Sessions and Much More

The 2016 Gartner IAM Summit is just around the corner. Check out the jam-packed agenda and view the cloud IAM video that could help you earn free swag.

The post Gartner IAM Summit 2016: Your Ultimate Guide to Must-Attend Sessions and Much More appeared first on Security Intelligence.

Continue reading Gartner IAM Summit 2016: Your Ultimate Guide to Must-Attend Sessions and Much More

Clearing the Fog: Defining the Fundamental IAM Domains

The use of identity and access management is widespread, but the IT industry still lacks a consistent set of definitions for the fundamental IAM domains.

The post Clearing the Fog: Defining the Fundamental IAM Domains appeared first on Security Intelligence.

Continue reading Clearing the Fog: Defining the Fundamental IAM Domains

Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence

An effective identity governance and intelligence solution enables IT leaders to manage and monitor the levels of access granted to each individual user.

The post Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence appeared first on Security Intelligence.

Continue reading Learn How to Protect Yourself From Yourself With Identity Governance and Intelligence

Mainframe Security: An Easy and Intuitive Access Security Model

Mainframe security is easier to understand and more intuitive to implement than many IT professionals think. A simple model can protect against any attack.

The post Mainframe Security: An Easy and Intuitive Access Security Model appeared first on Security Intelligence.

Continue reading Mainframe Security: An Easy and Intuitive Access Security Model

The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices

Most professionals grasp the importance of user authentication, but few recognize the benefit of using IAM and authentication as a standalone authority.

The post The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices appeared first on Security Intelligence.

Continue reading The Case for IAM: Three Reasons to Develop Your IAM and Authentication Practices

Identity and Blockchain: Pseudo-Anonymous Bitcoin Versus Trusted Participant

Since its creation, blockchain has risen in popularity among security experts and the public. It has even been touted as the silver bullet of cybersecurity, unbreachable and safe. But viewing blockchain in that light is overly simplistic. To maximize its usefulness, specifically for the enterprise, blockchain as a technology must evolve to embrace identity and […]

The post Identity and Blockchain: Pseudo-Anonymous Bitcoin Versus Trusted Participant appeared first on Security Intelligence.

Continue reading Identity and Blockchain: Pseudo-Anonymous Bitcoin Versus Trusted Participant

IDaaS News: Cloud IAM Is a Game Changer for the CIO’s Office at IBM

If you are burdened with an expensive legacy IAM environment, you are not alone. Read how IBM’s office of the CIO eliminated IAM challenges with IDaaS.

The post IDaaS News: Cloud IAM Is a Game Changer for the CIO’s Office at IBM appeared first on Security Intelligence.

Continue reading IDaaS News: Cloud IAM Is a Game Changer for the CIO’s Office at IBM