Identity Management & Cybersecurity News | 8.16.2018

Posted: 
Aug. 16th, 2018

CybersecurityHow continuous identity and access management transforms secure access

An identity and access management system capable of continuous authentication is one that constantly gathers intelligence about users and their behavior so that it eventually knows enough to authenticate, and grant access based on that knowledge.  Read more...

 

Access management: What agencies need to know

Identity has always been a critical component of online communications, even from the first days of America Online. Is the person on the other end of the connection also a basketball fan who likes dogs and lazy Sundays, or is it someone completely different, changing his identity for potential personal gain?  That question has become more serious as the internet has matured. Agencies want to ensure that those who access government information are the right people, getting the right resource at the right time for the right reason.  Read more...

 

Combating Cybersecurity Challenges

Federal agencies are mandated to manage risk in critical infrastructure, whether it is in asset management, identity management, remote access, or network protection. We have made it a top priority to strengthen Identity, Credential, and Access Management (ICAM), better manage user permissions, prevent data loss, secure remote access, and address insider threats.  Read more...

 

How to Design A Strong Cybersecurity Strategy for Your Enterprise

A strong cybersecurity strategy can’t get caught up in the hype of headlines or in popular perceptions. Your strategy must be ready for internal and external threats, regardless of their scale, form, or target. Exclusively focusing on one or the other is a recipe for disaster. Part of forming the most comprehensive cybersecurity strategy is to recognize that no one solution alone can solve all of the problems your enterprise faces or maintain a strong IT perimeter. For example, access creep, a symptom of the absence of access management or identity governance, can affect your security perimeter by essentially rotting it from within.  Read more...

 

Gartner Says IT Security Spending to Hit $124B in 2019

Security spending should be more than $114 billion in 2018 and grow by 8.7% to $124 billion in 2019. Privacy will drive many of the new expenditures, with identity and access management, identity governance and administration, and data loss prevention key areas of interest.  Capital purchases are not the only reason for spending: ongoing skills shortages and concerns over regulations such as GDPR are driving organizations to build more relationships with security services to bridge gaps in their capabilities. Gartner estimates that services will represent at least half of security software delivery by 2020.  Read more...

Author Information