New Zealand's leading source of cybersecurity and threat news
Identity and Access Management
These search results are from across the Techday network of sites
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
Gartner: Smartphone biometrics coming to the workplace
Gartner predicts increased adoption of mobile-centric biometric authentication and SaaS-delivered IAM.
Ping Identity CTO’s cybersecurity predictions for 2019
“Our borderless world provides unprecedented freedom and convenience, but also breeds a whole new set of cybersecurity risks and concerns.”
Stronger security needed before open banking arrives - Okta
As early as July 2019, Australian banks will need to have a system in place that both benefits customers and protects their personal data.
Ping Identity doubles down on APAC channel with new hire
The company has made its first regional channel appointment with a new APAC channel and alliance manager.
Akamai acquires Janrain for access management capabilities
Janrain enables enterprises to enhance digital trust by offloading login and registration workloads.
How protecting critical infrastructure starts with securing social media
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
ForgeRock updates multicloud identity management solution
Organisations today need to maintain an identity platform that enables both friction-free and highly-secure authentication.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
The key pillars of strong cybersecurity strategies
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
Exclusive: Okta’s new GM shares its APAC strategy
“We believe that partnering with systems integrators, independent software vendors and consulting companies is a key factor of success for Okta.”
SailPoint improves security and compliance with SaaS update
New in IdentityNow is the Dynamic Discovery Engine, which allows users to easily and quickly create policies, access reviews, dashboards and reporting.
Organisations still can’t get access management right - One Identity
These and other findings paint a bleak picture of how many organisations approach IAM and PAM programs.
Yubico to provide hardware security key with Okta’s MFA
YubiKeys, hardware-based protection in the form of physical devices, provide an option for a second factor in Okta MFA.
APJ customers don’t really trust companies with their data - report
40% of APJ business executives surveyed admitted to selling consumer data.
SailPoint updates IdentityIQ to expand definition of digital identities
The update gives enterprises the ability to govern non-human identities such as software bots, including robotic process automation (RPA) bots.
Exabeam and Okta partner to add context to identity management
The joint Exabeam and Okta solution will help security teams to monitor and protect enterprises against credential-based threats.
In a GDPR world, true passwordless security reigns
About 81% of mass breaches are caused by stolen or weak passwords, and just over half of data breaches involve some form of credential harvesting.
Exclusive: Measurement key to successful identity governance implementation
Access management is about providing a frictionless operating environment to lead business growth while reducing a business’s exposure to risk.