Posted on 01 February 2018 by Lorna Ayoun-Berdugo
Learn how cloud access management can provide confidence in your data security. By customizing and adapting access policies to various scenarios, IT can ensure that policies are as strict or lax as required—prompting for no credentials, a single credential or multiple credentials when a user logs into an SSO session.
Posted on 07 January 2016 by Thales
On December 15, 2015, the 28 EU Member states finalized the language of the new General Data Protection Regulation, meaning that a single set of information security rules will be enforced in the EU starting around 2018—providing organizations a two-year period to become compliant.
Posted on 11 March 2015 by Falco Christow
Learn the 10 elements that must be present in any security strategy designed to achieve or maintain data compliance and protect user data.