Overview: IGA solutions allow organizations to control user access, enforce policies, and ensure compliance across ...
IBM Corp. officials took steps earlier this month to give organizations better control over who can access critical information and resources. The company did this by entering into an agreement to buy ...
However, it wasn't until I received an eye-opening briefing from identity-appliance vendor Infoblox the other day that I really got turned on to the possibilities of this rapidly emerging area.
The ability to track and report on who's using your IT systems and how those systems are being used is crucial for companies that need to comply with new rules and laws governing data security. While ...
Sun next month will revamp its identity management software by consolidating its lineup of eight products into three offerings while integrating technology from its recent acquisition of provisioning ...
It is the fifth consecutive year that the Islandia, N.Y.-based management software company has been named the market leader by IDC, a research and analysis company based in Framingham, Mass. IDC's ...
Sun Tuesday announced it has entered into an agreement to acquire Austin, Texas-based identity management software vendor Waveset Technologies for an undisclosed price. Steve Pelletier, vice president ...
Security vendors Entrust and Trustgenix yesterday announced an alliance designed to strengthen the security of federated identity management relationships. The companies made the announcement at the ...
The process of managing employee identity, or ensuring that IT resources can only be accessed by the right users, has been evolving since the very first terminal-based login. From desktop-based ...
Microsoft Corp. today announced plans to release a free identity management specification that it says can help software developers make Web surfing more secure. Microsoft is making the Identity ...
CISA and NSA Issues New Identity and Access Management Guidance for Vendors Your email has been sent This CISA-NSA guidance reveals concerning gaps and deficits in the multifactor authentication and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results