Access all Areas?

Driven by a growing number of security breaches, the demand for greater mobility at work and the trend towards Bring Your Own Device (BYOD) in the workplace, Identity and Access Management (IAM) is a growing area of focus for businesses across many sectors. Just how intense that focus is set to become is illustrated in […]

Read More…

Tips to Transitioning New Projects to Business as Usual (BAU)

Handing off a new service or tool from one department to another, even within the same organization, is harder than it looks. Often times great ideas that lead to good initiatives are not properly adopted, understood or communicated by the groups tasked with running their day to day operations. For the company and strategic-facing development […]

Read More…

The BYOD explosion: How much of a threat do personal devices really pose to your network?

How much of a risk is BYOD to network security? No more than company-issued hardware – provided businesses follow these four essential steps says Lee Painter. We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as […]

Read More…

Integration Point: Password Manager and Digital Transformation

Disruption is everywhere. The S&P 500, normally a bastion of stability, experienced an unprecedented 50 percent churn rate in just the past 15 years. In 1999, General Electric and Coca-Cola were at the top of the list. Today it’s Apple and Google. And look at a company like Uber, which owns no cars and predominantly […]

Read More…

Top Three Issues Cloud-Based Password Managers Face

Password managers face a daunting task. The creation and management of user access to connected devices, as well as user access and authentication into external and internal applications, databases and networks is riddled with both scalability and security challenges. Complicating the matter is the fact that user authentication and verification are the cornerstones of any […]

Read More…

Six Steps to Avoid Becoming A Data Breach Statistic

US fast-food chain Wendy’s is the latest organisation to suffer a significant data breach. As the story unfolds, it’s clear the business seems to have been caught off guard in fully understanding the impact and extent of the breach. This isn’t at all unusual – the first time many businesses know they’ve been hacked is […]

Read More…

Password Manager in Healthcare: The Implications of the Internet of Things (IoT) in the Healthcare Industry

The positive effects of IoT in the healthcare industry are undeniable, and by some accounts, staggering. The development of life-changing technology for homes, hospices, healthcare clinics, and hospitals is rampant. IoT in healthcare is a fire that grows uncontrollably, inspiring companies like Philips, best known for personal hygiene, to create an entire healthcare subsidiary dedicated […]

Read More…

Getting to User Adoption: Top 2 Steps that Jump the Gap in password managers

Poor user adoption is a nightmare shared by most IT project managers. The idea of spending countless dollars and hours of labor only to go live with a new service or tool that lacks total end-user adoption is enough to keep anyone awake at night. Such a fear is prevalent even with the implementation of […]

Read More…

The Requirements Quagmire: Sidestep a Common Single Sign-On Implementation Issue

A good foundation is just as crucial in implementing a technology, like Single Sign-On, as it is in building a sturdy structure. In implementing a technology initiative, that foundation starts with acquiring and documenting the business and technology requirements in a clear manner. All too often the lack of properly documented requirements right from the […]

Read More…

Success to Having Maximum Security When it Comes to Mobility

Mobility can be challenging if it is not managed correctly. Incorporating mobility into the business strategy can effectively extend and establish the organisations potential as well as employee productivity. However, this can place excessive demands and pressure on the IT administrators, management and security team. The reason for the increased burden and pressure on the […]

Read More…