SailPoint acquires SecZetta to help companies validate non-employee identities

With nearly half of today’s enterprises comprised of non-employees, organizations need to factor this growing group of identities into their approach to identity security. With SecZetta, SailPoint will be able to expand its capabilities to help compani… Continue reading SailPoint acquires SecZetta to help companies validate non-employee identities

SecZetta and Active Cyber help clients optimize their third-party identity governance processes

SecZetta announced a new partnership with Active Cyber, a cloud consultancy, specializing in the implementation of Cloud-based Identity & Access Management (IAM) solutions. Active Cyber will resell the SecZetta Third-Party Identity Risk solution an… Continue reading SecZetta and Active Cyber help clients optimize their third-party identity governance processes

Manage and monitor third-party identities to protect your organization

SecZetta shared a research that demonstrates a clear misalignment between the strategies organizations currently use and what is actually required to protect them from cyberattacks due to third-party vulnerabilities. Monitor third-party identities and … Continue reading Manage and monitor third-party identities to protect your organization

SecZetta partners with One Identity to automate identity access for third-party users

SecZetta announced a new integration in partnership with One Identity. The integration of the SecZetta Third-Party Identity Risk solution with the One Identity Active Roles solution enables seamless provisioning and deprovisioning of AD accounts and al… Continue reading SecZetta partners with One Identity to automate identity access for third-party users

Reliance on third party workers making companies more vulnerable to cyberattacks

A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data systems have become more vulnerable to cyberattacks. Further, 88% of people say… Continue reading Reliance on third party workers making companies more vulnerable to cyberattacks

Third-party identity risk management, compliance, or both?

Third-party risk management and compliance have traditionally gone hand-in-hand. One is a business requirement, the other a business necessity. So, which comes first? Or rather, which should come first? Third-party identity risk management Before divin… Continue reading Third-party identity risk management, compliance, or both?

How do I select a PAM solution for my business?

In order for organizations to prevent becoming the next victim of a breach due to unauthorized third-party user access, as has happened in prominent recent breaches, a strong security posture built around privileged access management (PAM) and identity… Continue reading How do I select a PAM solution for my business?

Minimizing cyberattacks by managing the lifecycle of non-human workers

The number of non-human workers is growing, particularly as global organizations increasingly prioritize cloud computing, DevOps, IoT devices, and other digital transformation initiatives. Yet, organizations frequently only apply access controls to hum… Continue reading Minimizing cyberattacks by managing the lifecycle of non-human workers

SecZetta and Focal Point provide clients with a 360° view of third-party identity and lifecycle management

SecZetta, the leading provider of third-party identity management solutions, and Focal Point, a leading cybersecurity services provider, announced a new solution integrator partnership. Together, SecZetta and Focal Point provide clients with a 360° vie… Continue reading SecZetta and Focal Point provide clients with a 360° view of third-party identity and lifecycle management