Being a security leader in today’s dynamic environment is a challenge. They are constantly fending off increasingly sophisticated attacks, usually with limited resources and minimal Board support. The attack surfaces are expanding as organizations support a remote workforce, adopt cloud strategies, and take on digital transformation initiatives. The consequences of a breach are shifting from…
Archives
-
Adobe Finds ZEN Using Identity-Centric Security
As with most organizations that are implementing digital transformation initiatives, Adobe faced the struggle to find the balance between a pleasant user experience and stringent security requirements. With the increased complexity of user authentication, blending usernames and passwords with second factor authentication, the user experience can suffer. In many cases users needed to re-authenticate many…
-
Ditch Siloed IAM – Convergence is Key to Driving Optimum Cloud Security
For today’s enterprises, the demands of securing hybrid workforces, cloud environments, and digital transformation initiatives have placed identity at the center of strategic discussions about security. Identity is the link that connects users to the devices, services, and applications they use during a time when the traditional perimeter has been eroded. But managing identity and…