Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Identity & Access Management 



April 19, 2018 | Account Provisioning
By Aaron Turner, IANS Faculty

 Cloud Provisioning: Know the Issues

The good news for cloud identity management? Authentication standards are solid. The bad news? Authorization standards are nowhere near as mature. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the many challenges in cloud provisioning and recommends focusing on making role-based access control (RBAC) as efficient as possible.

Read More »


March 28, 2018 | Authentication
By Aaron Turner, IANS Faculty

 Outsourced Authentication: When It Works – and When It Doesn’t

In this always-on cloud/mobile world, many organizations are outsourcing their application authentication to the likes of Google, Facebook and LinkedIn. In this report, IANS Faculty Aaron Turner explains when handing your authentication tasks to a third-party makes sense – and when it doesn’t. He also details the key decision factors to consider before making the move. 

Read More »


March 21, 2018 | Authentication
By James Tarala, IANS Faculty

 An Enterprise Guide to Practical MFA

Multifactor authentication (MFA) provides a more robust solution than simple passwords, and while the latest offerings are more user-friendly and easier to deploy than ever before, selecting the right implementation and feature set is no easy feat. In this webinar, IANS Faculty James Tarala details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »


March 13, 2018 | Account Provisioning
By Andrew Carroll, IANS Faculty

 Ease IDAM by Automating Three Key Processes

Automating identity and access management (IDAM) processes can make a security organization more efficient and effective, but where to start? In this Ask-an-Expert written response, IANS Faculty Andrew Carroll suggests automating three key functions: network provisioning/de-provisioning, entitlement review and application role provisioning.

Read More »


March 7, 2018 | Authentication

 Multi-Factor Authentication (MFA) Checklist

It's clear multi-factor authentication (MFA) offers a far more robust solution than passwords alone for protecting critical systems and data. In this checklist, IANS details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »


March 6, 2018 | Privileged Access Management
By Andrew Carroll, IANS Faculty

 A PAM Tool Comparison (Updated)

Managing privileged users is becoming increasingly critical, but choosing the right enterprise-grade PAM tool is not straightforward. In this update to a previous Ask-an-Expert written response, IANS Faculty Andrew Carroll underscores the importance of matching the tool to the use case and adds Centrify to his comparison of CyberArk and Osirium across key use case criteria.

Read More »


February 14, 2018 | Authentication
By Andrew Carroll, IANS Faculty

 Understanding Blockchain’s Promise for Identity Management

While blockchains were developed to solve problems very different from identity management, some vendors (and enterprises) are beginning to explore how blockchains could be used to both secure and provide more granular control over digital identities. In this report, IANS Faculty Andrew Carroll explains the pros and cons of using blockchains for identity, and provides a practical overview of the vendors addressing the space.  

Read More »


January 18, 2018 | Mobile Access and Device Management
By IANS Faculty, IANS Faculty

 Balance Security and Usability with Mobile Passcodes

When it comes to mobile device passcodes, organizations constantly search for a happy medium between security and usability. In this Ask-an-Expert live interaction, IANS Faculty Justin Wilder details the various options and recommends allowing less complex passwords and Touch ID access, but also adding compensating controls to ensure data stays safe. 

Read More »


January 8, 2018 | Privileged Access Management
By Andrew Carroll, IANS Faculty

 CyberArk vs. Osirium: A PAM Tool Comparison

Managing privileged users is becoming increasingly critical, but choosing the right enterprise-grade PAM tool is not straightforward. In this Ask-an-Expert written response, IANS Faculty Andrew Carroll underscores the importance of matching the tool to the use case and compares CyberArk and Osirium across key use case criteria.

Read More »


December 21, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Manage SSH and RDP Securely

SSH and RDP are widely leveraged across most enterprises, but what are the best practices for securing them? In this Ask-an-Expert written response, IANS Faculty Aaron Turner underscores the importance of segmentation/filtering, jump servers and multifactor authentication in ensuring both protocols are implemented and managed securely.

Read More »