Posted on 15 February 2018 by Thales
Discover how to adopt cloud IAM measures for an effective digital transformation strategy with our three-part blog series that addresses the best way to secure multiple cloud services, why cybercriminals prefer privileged users, and how to provide both convenience and security for standard employees.
Posted on 04 January 2018 by Thales
Prevent data breaches in 2018 with cloud access management. MFA is only part of the solution. By combining cloud single sign-on, MFA and granular policies, access management solutions provide security leaders with a single pane of glass from which to define and enforce access controls on all their cloud and web apps.
Posted on 12 December 2017 by Lorna Ayoun-Berdugo
Identity and Access Management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM solutions provide a methodic framework for granting and requesting access to applications along with enforcing access controls and ensuring visibility into access events.
Posted on 17 October 2017 by Jennifer Dean
An important part of GDPR addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals. Are you ready?
Posted on 05 April 2017 by Thales
Hollywood is portraying the cybersecurity industry as action packed and engaging with hackers from the dark side. What can we learn from cybercriminals? How is Hollywood educating society to be more secure online?
Posted on 08 March 2017 by Thales
Identity and access management trends are revealing a clouded IT perimeter which makes security challenging. Check out our overview of technologies to help you navigate your journey.