New Zealand's leading source of cybersecurity and threat news
Identity and Access Management
These search results are from across the Techday network of sites
Milestone: How video management software improves access control
Integrated solutions like this are particularly useful in busy industries such as mining, energy and logistics.
NEC develops new O-RAN compliant 5G base station equipment
NEC's RU is supposedly ideal for 5G conditions as they are compact, lightweight and consume a low level of power, which reduces installation and operation costs.
AlgoSec integrates privileged account access security support
“With support for CyberArk, mutual customers can now take a business-centric approach to security policy."
SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Okta: Reclaiming control over digital identity
What is a digital identity? Who is responsible for that information? And what rights do digital citizens have?
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
Gartner: Smartphone biometrics coming to the workplace
Gartner predicts increased adoption of mobile-centric biometric authentication and SaaS-delivered IAM.
Ping Identity CTO’s cybersecurity predictions for 2019
“Our borderless world provides unprecedented freedom and convenience, but also breeds a whole new set of cybersecurity risks and concerns.”
Stronger security needed before open banking arrives - Okta
As early as July 2019, Australian banks will need to have a system in place that both benefits customers and protects their personal data.
Ping Identity doubles down on APAC channel with new hire
The company has made its first regional channel appointment with a new APAC channel and alliance manager.
Akamai acquires Janrain for access management capabilities
Janrain enables enterprises to enhance digital trust by offloading login and registration workloads.
How protecting critical infrastructure starts with securing social media
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
ForgeRock updates multicloud identity management solution
Organisations today need to maintain an identity platform that enables both friction-free and highly-secure authentication.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
The key pillars of strong cybersecurity strategies
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
Exclusive: Okta’s new GM shares its APAC strategy
“We believe that partnering with systems integrators, independent software vendors and consulting companies is a key factor of success for Okta.”