Asia's leading source of security and threat news
Identity and Access Management
These search results are from across the Techday network of sites
Okta introduces customisable building blocks for identity verification
Passwordless authentication, progressive profiling, per-app branding and unlimited use cases are now possible with the Okta Identity Engine.
Okta enables developers to create unlimited platform integrations
Advanced development functionality provided by Hooks opens the Okta Integration Network to a wide array of new types of custom, secure integrations.
Sphere Identity launches self-sovereign identity platform
“Customer dropoff, revenue loss, data harvesting, and security breaches have become characteristic of this digital age, for both businesses and consumers.”
Certificate-related outages impact 60% of businesses - Venafi
Certificate-related outages harm the reliability and availability of vital network systems and services while also being difficult to diagnose and remediate.
Security top priority for Filipinos when choosing a bank - Unisys
Filipinos have greatest appetite in Asia Pacific to use biometrics to access banking services
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Why it’s time to move ID card issuance to the cloud
Many smartcards are still issued from standalone printers tied to a dedicated PC workstation, which creates challenges and unnecessarily bottlenecks the process.
Okta to acquire Azuqua to connect business apps in the enterprise
The average Okta customer has 83 cloud apps, and 9% of customers have more than 200 cloud apps.
Accenture Security launches IAM capability for user privileges
When it comes to managing user privileges, the provisioning of access should be based on precise knowledge of who a person is and why they need it.
How to optimise the performance of SIEMs
Optimising your SIEM is most easily and effectively done by also optimising your log management.
Interview: Why log management is crucial to modern business
One Identity's IT veteran Balázs Scheidler shares his insights on log management's history and where it's going to next.
How cybercriminals are most likely to be caught
Fifteen per cent of IT managers at Australian companies who were victim to one or more cyber attacks last year can’t pinpoint how the attackers gained entry.
SSL/TLS certificate marketplaces thriving on dark web - study
These services deliver machine-identities-as-a-service to cybercriminals who wish to spoof websites, eavesdrop on encrypted traffic, perform man-in-the-middle attacks and steal sensitive data.
Gartner’s top security and risk management trends
Leaders in the space must properly prepare to improve resilience and support business objectives.
ManageEngine introduces user and entity behaviour analytics in its SIEM solution
"In today’s IT security landscape, rigid alert rules and conventional threat detection systems no longer make the cut.”
Verizon report spotlights mitigating insider threats
Companies are too often hesitant to recognise, report or take action against employees who have become a threat to their organisation.
W3C and FIDO Alliance finalise web standard for passwordless logins
Major browsers and platforms now have built-in support for the new WebAuthn security standard.
Forcepoint launches new converged cybersecurity solutions
Forcepoint is addressing the need for consolidated, cloud-based security solutions in a deployment-agnostic delivery model.
Scytale Enterprise streamlines authentication management
By consolidating authentication practices for all services, organizations will greatly simplify IT service orchestration as they transition to cloud environments while achieving security assurance."
ImageWare unveils biometric-based digital identity platform
"Identity is the new security perimeter," declares ImageWare CEO Jim Miller.
Veritas Backup Exec certified for Microsoft Azure and Windows Server 2019
“Veritas and Microsoft are working together so that customers can protect their critical business applications across the cloud."
Capgemini and IDEMIA launch IoT device management platform
“Capgemini’s agreement with IDEMIA will provide a fully agnostic, configurable and secure platform from an endpoint device to the cloud.”
Mobile document management policies impair workers
Most employees need access to company documents on their mobile devices, but almost half can’t get that access because organisations aren’t keeping up.