Identity and Access Management News

68% of data breaches take months or longer to discover

68% of data breaches take months or longer to discover

Data Breach Investigations The eleventh annual Verizon Data Breach Investigations Report (DBIR) provides valuable insight for the Identity and Access Management community.  The research is based on analysis of over 50,000 real-world incidents, and over 2000 confirmed...

read more
Mobile Blockchain Identity Management

Mobile Blockchain Identity Management

Mobile Authentication Taskforce The evolution of blockchain is transforming every aspect of cyber security including mobile identity and access management.  AT&T, Sprint, T-Mobile and Verizon formed the Mobile Authentication Taskforce last year to protect...

read more
Decentralized Identity Strategy

Decentralized Identity Strategy

The Problem? Enterprises are recognizing that a centralized identity model is difficult to sustain. The number of digital identities and types of application relationships grow faster than what the enterprise can adequately respond to.   The Solution =...

read more
How to prevent the Uber hack?

How to prevent the Uber hack?

    Uber invested millions of dollars in security infrastructure designed to protect customer data but In October 2016, they experienced a massive data security incident. Hackers stole personal information from 57 million user accounts including email...

read more
M&A Identity Integration & Modernization

M&A Identity Integration & Modernization

Customer Challenge Modernize Identity management operations for a Global financial services portal supporting 800,000 customers, staff, and partners operating in 23 countries. The portal supports segmented integration with multiple identity sources including cloud,...

read more
What is the best way to integrate Okta with Azure AD?

What is the best way to integrate Okta with Azure AD?

  Leading identity and access management (IAM) solutions offer robust features to control just about every aspect of Identity Management, but the days where one IAM platform works for all situations are ending. The modern application and identity landscape is...

read more
Return On Investment

Return On Investment

Return On Investment    Traditional Centralized Model Number of credentials = Number of Users X Number of Applications Example 10,000 Users access 15 applications =150,000 credentials x $50 user support cost =$7.5 million support cost $75,000 cost per connected...

read more
Application Integration

Application Integration

Application Orchestration The number of enterprise applications and SAAS services will continue to increase exponentially. The average enterprise uses 91 cloud services for marketing alone. Application growth is expanding faster than that the rate of available IT...

read more
Attribute Based Access Control (IDABAC)

Attribute Based Access Control (IDABAC)

Identity Attribute Based Access Control (IDABAC) Centralized directories that combine, employee, partner, and, customer data are a security nightmare. They create a perfect attack scenario by putting all your important data in one place. The IdRamp decentralized...

read more