Technology news for Australia's largest enterprises
Identity and Access Management
These search results are from across the Techday network of sites
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
Exclusive: Okta CSO on scaling security alongside business growth
Yassir Abousselham shares his unique insights as the chief security officer of a fast-growing identity and access management service provider.
ForgeRock achieves open banking compliance certification
FAPI is an open standard designed for banks and fintechs in Europe and around the world to build Open Banking standards for secure exchange of consumer financial information.
SIM swapping: What is it and should you be worried?
Due to the growing reliance on mobile phones, SIM swapping is increasingly targeted as a way to take over a victim’s online accounts.
SolarWinds adds password management to security portfolio
SolarWinds acquired Passportal, which delivers MSP-focused password management and privileged client knowledge management tools that integrate with IT software products.
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
85% of organisations struggling with access management – Thycotic
More than 50% of the organisations surveyed said privileged accounts never expire or get deprovisioned.
Okta enables developers to create unlimited platform integrations
Advanced development functionality provided by Hooks opens the Okta Integration Network to a wide array of new types of custom, secure integrations.
Okta introduces customisable building blocks for identity verification
Passwordless authentication, progressive profiling, per-app branding and unlimited use cases are now possible with the Okta Identity Engine.
Sphere Identity launches self-sovereign identity platform
“Customer dropoff, revenue loss, data harvesting, and security breaches have become characteristic of this digital age, for both businesses and consumers.”
Certificate-related outages impact 60% of businesses - Venafi
Certificate-related outages harm the reliability and availability of vital network systems and services while also being difficult to diagnose and remediate.
Security top priority for Filipinos when choosing a bank - Unisys
Filipinos have greatest appetite in Asia Pacific to use biometrics to access banking services
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Why it’s time to move ID card issuance to the cloud
Many smartcards are still issued from standalone printers tied to a dedicated PC workstation, which creates challenges and unnecessarily bottlenecks the process.
Okta to acquire Azuqua to connect business apps in the enterprise
The average Okta customer has 83 cloud apps, and 9% of customers have more than 200 cloud apps.
Accenture Security launches IAM capability for user privileges
When it comes to managing user privileges, the provisioning of access should be based on precise knowledge of who a person is and why they need it.
How to optimise the performance of SIEMs
Optimising your SIEM is most easily and effectively done by also optimising your log management.
Interview: Why log management is crucial to modern business
One Identity's IT veteran Balázs Scheidler shares his insights on log management's history and where it's going to next.
How cybercriminals are most likely to be caught
Fifteen per cent of IT managers at Australian companies who were victim to one or more cyber attacks last year can’t pinpoint how the attackers gained entry.
SSL/TLS certificate marketplaces thriving on dark web - study
These services deliver machine-identities-as-a-service to cybercriminals who wish to spoof websites, eavesdrop on encrypted traffic, perform man-in-the-middle attacks and steal sensitive data.
Gartner’s top security and risk management trends
Leaders in the space must properly prepare to improve resilience and support business objectives.
ManageEngine introduces user and entity behaviour analytics in its SIEM solution
"In today’s IT security landscape, rigid alert rules and conventional threat detection systems no longer make the cut.”