The cloud isn’t coming — it’s here. And the quicker we all get on board, the better off we’ll be, right?!
Digital transformation, IT modernization projects and cost-control initiatives all point to the cloud as the easiest, most…
The cloud isn’t coming — it’s here. And the quicker we all get on board, the better off we’ll be, right?!
Digital transformation, IT modernization projects and cost-control initiatives all point to the cloud as the easiest, most…
The expense to unlock a user’s account goes far beyond billable helpdesk hours but also lost the productivity of everyone impacted by the lack of user access – including the user, the user’s internal and external clients – and even the Helpdesk representative…
We recently had the opportunity to host an interview with Tim Eichmann, Head of Cloud & Infrastructure at Core Technology Systems (UK) Limited and One Identity.
Core Technology Systems (UK) Limited help organisations large and small to achieve their…
Provisioning.
Workflow.
Policies.
When these words come up people suddenly have a thought in their mind defining its meaning. Many Identity Management products sound the same, One identity even has multiple products that may use the same words to describe…
During the recent One Identity EMEA Partner Forum – a highlight for everyone was a Celebration Dinner featuring our recognition award winners 2016.There were seven categories presented by Gyles Brandreth (former MP, broadcaster and author) and Ian Sutherland…
There’s one in every family: The person who knows all the secrets. From helpful information like who to turn to for the cookie recipe that’s been passed down for generations to the financial, health and other personal details that need to be kept within…
Our on-demand knowledge webcast series, addressing the directives Federal CIO Tony Scott gave to agencies for the 30-day Cybersecurity Sprint concludes with a discussion of the fourth and final directive:
“Dramatically accelerate implementation of…
So a lot of people have asked what we intend to cover at the first One Identity EMEA Partner Forum. Firstly, I would like to cover why we have named this a Forum. Earlier this year I was captivated by a trip I took to Rome, where I was able to visit…
In today’s world, organizations need to have the right security policies and practices in place to prevent intrusions, protect data and ensure compliance with corporate policies and government regulations. When security enables an organization to make…
Watch Now: OnDemand Webcast
Learn IAM best practices to keep your systems compliant and secure.
Your IT systems and process have to be compliant, and they have to be secure. That’s why, ideally, your security investments should also help with compliance…
Most of us know what Two Factor Authentication is after all it has been with us for over 25 years. But while we have all been busy things have been changing slowly and steadily, especially when it comes to choosing whether to deploy hardware, software…
In this current era, we all become reliant on our technology. We can meet over the internet via phone or web conferences – putting video conferencing in all our hands. It has its benefits saving us valuable time and money – but it is missing the…
For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts often compete with projects that address information security threats and vulnerabilities, and these efforts often lose out in the battle…
While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB International…
Using the user, group and role-based management features of payment and business applications that accept cardholder data or sensitive authentication data is not enough to secure your data and ensure compliance with PCI DSS requirements.
The set of system…
The controls used in the cardholder data environment (CDE) and the risks considered during the CDE scoping effort, such as all possible user access to account data (CHD and SAD), the DSS points them to consider whether the organization identified “all…
Digital Transformation of business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation. Organizations that do not adapt to the transformation are risking their very survival. Furthermore…
I’ve been there and asked that question. When I was a state IT manager, knowing that service account password was just part of keeping things running on a day to day basis. My team knew it and members of our security and server teams knew it.
…There’s a growing buzz about this new regulation called GDPR (General Data Protection Regulation). It requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake…
As if PCI, SOX, HIPAA, GLB, and all the other alphabet-soup regulations aren’t enough to bog down your security program, we now have a new one rearing its ugly head. The new regulation is the European Union General Data Protection Regulation – or GDPR…
“The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.
Cloud and SaaS offerings affect businesses in the reduced…
Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…