Editor's note
In IT security, access governance is all about reducing to the extent possible the risk that comes with end users, specifically the danger of excessive or unnecessary access privileges to systems and data. This includes the issue of setting strategy and policy to guide who has access to what; avoiding privilege creep; updating authentication processes; and keeping costs contained. The end goal is for the enterprise to put in place a secure authentication and access process -- and keep it up to date.
As the tools and methods evolve, an enterprise access governance system must also evolve. This guide looks at the parameters of identity and access management now, with an eye to keeping IT security pros updated on the latest developments in identity and access management.
1Au revoir, passwords; bon jour multifactor authentication
Keeping control over who has access to valuable and sensitive company data and systems demands moving past the username/password approach to IAM. Get up to speed on using multifactor authentication by reviewing these timely materials.
-
Article
Get up to date on two major advances in authentication
Considering biometric authentication? Or maybe multifactor? Learn the pros and cons of each and how they might be used in conjunction. Read Now
-
Article
Explore the knowledge factors that work best with mobile
Improved access governance can be achieved for mobile devices by using two-factor authentication methods and tools. But a key question is what knowledge factors will be most effective. Read Now
-
Article
Does a multifactor authentication app really work?
Multifactor authentication apps promise to up security on mobile devices but there are pros and cons to adding MFA to apps. Read Now
2Effective IAM strategy and advanced tech truly vital now
Desperate times calls for cutting-edge measures. Learn the many ways -- from the FIDO Alliance to the development of cryptographic keys -- those at the forefront of IT security are developing strategic means and advanced tech to protect company assets.
-
Article
Time to modernize your approach to access governance
Most companies' identity and access strategies could use an update. Could yours? Read Now
-
Article
IAM systems get schooled by machine learning
Machine learning technologies are taking root in company IAM systems. What's the appeal? Can it really work and are there risks you need to be aware of? Read Now
-
Article
Identity federation management: The pros and the cons
In mobile, identity federation is fairly new tech. Which means it still has some challenges. Learn to deploy it painlessly. Read Now
-
Article
Move over password; here come cryptographic keys
The phishes have come for your password; secure authentication by switching to the use of cryptographic keys. Read Now