Filter By:

Recent Blogs & Podcasts

Insights

\ Identity & Access Management 



June 30, 2017 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Build a Scalable Privileged Identity Management Program

The scope of the privileged identity problem continues to expand for organizations and is only exacerbated by the lack of investment in IDAM technologies. In this report, IANS Faculty Aaron Turner offers recommendations for aligning an overarching identity program with privileged user management from both a process and technology perspective. 

Read More »


June 2, 2017 | Authentication
By Aaron Turner, IANS Faculty

 Authentication: Past, Present and Future

Authentication methods and protocols have changed a lot over the years, but which are best suited to today's complex enterprise environments? In this Ask-an-Expert written response, IANS Faculty Aaron Turner provides an overview of the most used (and effective) authentication protocols.

Read More »


May 24, 2017 | Security Policies and Strategy
By George Gerchow, IANS Faculty

 Get Your Security Spending Priorities in Order

Budgeting for new security initiatives requires prioritizing technologies that help improve security today -- and tomorrow. In this Ask-an-Expert written response, IANS Faculty George Gerchow offers his take on the importance of cloud access security brokers, privileged access management and other tools for companies moving to the cloud.

Read More »


May 11, 2017 | Cloud Application and Data Controls
By Aaron Turner, IANS Faculty

 Securing Cloud Assets Using Federated Identities

Whether you view the cloud as infrastructure-, platform- or application-as-a-service, identity is the only control that exists universally across all cloud environments. Unfortunately, identity lifecycle management for cloud-based systems is not as mature as we need it to be. In this report, IANS Faculty Aaron Turner details how to make wise investments in a federated identity strategy that can scale to even the most complex cloud technology models.

Read More »


May 10, 2017 | Authentication
By Aaron Turner, IANS Faculty

 Implementing Contactless MFA across a PKI Environment

Implementing contactless multifactor authentication (MFA) across an entire organization is difficult enough, without the added stress of getting it operational by year end to meet the tight deadline of DFARS compliance. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends taking a phased approach to ensure a seamless rollout. 

Read More »


April 26, 2017 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Choosing an IDAM Tool for the Future

Finding one tool to handle both identity and privileged identity management is difficult enough, but what about one that will also provide the right set of capabilities as identity needs evolve in the future? In this Ask-an-Expert written response, IANS Faculty Aaron Turner details how to evaluate current vendors to ensure they remain relevant today and tomorrow.

Read More »