Security Requirements Are Driving Identity Management

Anyone familiar with identity management knows that it can be extremely messy — lots of tactical tools, access policies, multiple data repositories, manual processes, etc. Furthermore, user authentication continues to be anchored by user names and passwords making nearly every organizations vulnerable to credentials harvesting, identity theft, and cyber-attacks.

Topics: Cybersecurity IAM identity management

Workspaces and Identity Management

Elaborating on a point from a recently published blog, What’s a Workspace?

We like to think of this as a transformation from personal computing (PC), where a user was typically associated with a device, to PCS (productivity, communication, and security), where users are associated with a workspace that can be accessed from a variety of devices and locations.

The user should be at the nucleolus of a mobility strategy. In the past, we have really managed everything from a device perspective, but with the onslaught of businesses embracing mobility to enhance their employee productivity, the swing toward putting the user at the center of the workspace is upon us.

Topics: identity management workspace

The Enterprise Security Model Is Experiencing “Death by a Thousand Cuts”

If enterprise security were an automobile it would be a Ford Taurus circa 1995. Good car way back when and still running but burning oil, barely passing inspection, and held together by bondo today.

Topics: Network Security Cybersecurity Information and Risk Management Security and Privacy Security endpoint security enterprise security compliance CISO mssp security operations security services CISSP identity management