Access all Areas?

Driven by a growing number of security breaches, the demand for greater mobility at work and the trend towards Bring Your Own Device (BYOD) in the workplace, Identity and Access Management (IAM) is a growing area of focus for businesses across many sectors. Just how intense that focus is set to become is illustrated in […]

Read More…

The BYOD explosion: How much of a threat do personal devices really pose to your network?

How much of a risk is BYOD to network security? No more than company-issued hardware – provided businesses follow these four essential steps says Lee Painter. We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as […]

Read More…

Integration Point: Password Manager and Digital Transformation

Disruption is everywhere. The S&P 500, normally a bastion of stability, experienced an unprecedented 50 percent churn rate in just the past 15 years. In 1999, General Electric and Coca-Cola were at the top of the list. Today it’s Apple and Google. And look at a company like Uber, which owns no cars and predominantly […]

Read More…

Top Three Issues Cloud-Based Password Managers Face

Password managers face a daunting task. The creation and management of user access to connected devices, as well as user access and authentication into external and internal applications, databases and networks is riddled with both scalability and security challenges. Complicating the matter is the fact that user authentication and verification are the cornerstones of any […]

Read More…

Six Steps to Avoid Becoming A Data Breach Statistic

US fast-food chain Wendy’s is the latest organisation to suffer a significant data breach. As the story unfolds, it’s clear the business seems to have been caught off guard in fully understanding the impact and extent of the breach. This isn’t at all unusual – the first time many businesses know they’ve been hacked is […]

Read More…