The Three Branches of Identity Governance

In addition to COVID, 2020 has also happened to be an election year. With US elections mostly completed and the US government in transition – whatever the outcome – certainly consideration of government and governance is top of mind for everyone at thi… Continue reading The Three Branches of Identity Governance

A Proposed New Trust Framework for Physical and Digital Identity Interactions

As we broaden our scope of identity and consider what is required to exchange trusted personal data across physical and digital realms, community interoperability becomes even more important.

The post A Proposed New Trust Framework for Physical and Digital Identity Interactions appeared first on Security Intelligence.

Continue reading A Proposed New Trust Framework for Physical and Digital Identity Interactions

Identity Analytics and the ‘2019 Gartner Magic Quadrant for Identity Governance and Administration’

IBM was named a Leader in the “2019 Gartner Magic Quadrant for Identity Governance and Administration” for its ability to execute and completeness of vision.

The post Identity Analytics and the ‘2019 Gartner Magic Quadrant for Identity Governance and Administration’ appeared first on Security Intelligence.

Continue reading Identity Analytics and the ‘2019 Gartner Magic Quadrant for Identity Governance and Administration’

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy

Reading Time: 3 minutes Organizations that fail to communicate identity and access management (IAM) processes in relevant business terms often struggle to gain user buy-in.

The post How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy appeared first on Security Intelligence.

Continue reading How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy

Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking

Identity and access management (IAM) has become increasingly challenging due to the complexity of more devices, applications, information, users and data privacy regulations.

The post Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking appeared first on Security Intelligence.

Continue reading Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking

Microsoft Previews Azure Active Directory Entitlement Management


Microsoft launched the preview of Entitlement Management, a new part of their Azure Active Directory Identity Governance program. The idea is that you can manage access to resources via policy, which seems to be a good thing, especially in large organizations where objects like Office 365 Groups, SharePoint Sites, and Teams might just get a little out of hand. The preview is interesting, but like all previews, it needs some work to be ready for prime time.

The post Microsoft Previews Azure Active Directory Entitlement Management appeared first on Petri.

Continue reading Microsoft Previews Azure Active Directory Entitlement Management

Blockchain: Making the Reward Much Greater Than the Risk

The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn’t fully explored.

The post Blockchain: Making the Reward Much Greater Than the Risk appeared first on Security Intelligence.

Continue reading Blockchain: Making the Reward Much Greater Than the Risk

Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.

The post Are Passwords Killing Your Customer Experience? Try Passwordless Authentication appeared first on Security Intelligence.

Continue reading Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

Design Your IAM Program With Your Users in Mind

To gain the buy-in you need to make your IAM program successful, it’s important to consider your employees’ goals and needs during the design process.

The post Design Your IAM Program With Your Users in Mind appeared first on Security Intelligence.

Continue reading Design Your IAM Program With Your Users in Mind