Blog
Going Passwordless – Separating Identity and Authentication
by Alejandro Leal
Identity and Authentication Digital transformation can be defined as a process that organizations go through to deliver digital services to their customers and consumers in the Digital Age. Essentially, delivering digital services requires the management of the digital identities of consumers, customers, and business partners in a secure and seamless manner. Therefore, the success of digital transformation initiatives depends on managing access and managing these digital identities. In contrast to the increased centralization of digital identity, the authentication layer has become...
Blog
Gear Up for the Future with Decentralized Identity
by Warwick Ashford
In the digital era, business would greatly benefit from having increased identity assurance levels, be able to interact securely with partners, suppliers, consumers, and customers, and be able to reduce the administrative load during onboarding or ongoing verification of credentials. One potential solution, that is gaining momentum and support around the world, is the implementation of decentralized Identity systems that use verifiable credentials that are tamper proof, can be stored in a digital wallet, and can contain a decentralized identifier that is globally unique and can be...
Blog
Passwordless Authentication 101
by Martin Kuppinger
Passwordless authentication has become a trending topic in IT over the past two years. This comes to no surprise, with all the password-related security incidents that happened in the past years. Passwords are known as a security risks, and passwords are inconvenient to the users. Passwordless authentication bears the promise of increasing security and reducing friction. Done right, this is true. Passwordless authentication can overcome the notion of “balancing security with convenience”, which factually says that convenience goes down when the level of security increases, to a...
Blog
How to Find the Best IT Solution for Your Business
by Marina Iantorno
Every company has different needs. These will depend on company size, location, products they offer, not to mention the current infrastructure in place. Unfortunately, there is not a solution that “fits them all”, and the high maturity of the IT market leads to numerous vendors offering their services. In this context, the main issue is not to cover the needs of an organization, but to choose the best solutions and to understand their advantages and disadvantages. Process phases Evaluating and selecting vendors and solutions is not an easy task. It is a process and...
Blog
CSLS 2022 Is a Wrap
by Susanna Dück
Navigator
IGA, the key to security and compliance
by Warwick Ashford
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become increasingly reliant on complex IT environments. Key to achieving both data security and regulatory compliance is the ability to manage identities effectively and enforce policy-based access controls to ensure only authorized people and things have access to IT systems and data under the correct circumstances. This has become increasingly challenging with the proliferation of digital...
Navigator
Reducing Risk Through Effective Access Management
by Warwick Ashford
Business is increasingly reliant on IT, from critical line-of-business applications, productivity and collaboration applications to e-commerce, and online customer services. In the modern world, it is more important than ever to ensure that the right people have access to the right systems at the right time, but that has become increasingly challenging. Not only are IT systems distributed across on-prem installations and multiple cloud providers, but attackers typically use compromised or stolen credentials as their primary way of gaining access to company networks and systems....
Navigator
The Evolving Role of the CISO
by Warwick Ashford
The role of the Chief Information Security Officer (CISO) has long been a topic for debate. Almost ever since the role first emerged as organizations saw the need to focus on information security, there has been discussion about the how role could or should evolve. With information security now more important than ever before, the role of the CISO continues to evolve and gain in importance, with responsibilities extending way beyond the IT department and technical issues to include processes, policy, strategy, regulatory requirements and collaboration with peers, technology developers...
Blog
Enhancing Zero Trust in a ServiceNow Environment
by Martin Kuppinger
Zero Trust has been established as the guiding principle for cybersecurity. The “don’t trust, always verify” approach stands for methods that don’t rely only on singular security tools, such as the traditional network perimeter firewall, to keep attackers out. Instead, Zero Trust builds on layered security and repeated or  continuous verification. The concept of Zero Trust has evolved beyond a network perspective, restricting lateral movements of users once they have passed the firewall. It involves a broader model that looks at many different layers of...
Navigator
Cyber Resilience
by Warwick Ashford
In the post-pandemic world, most people understand the concept of resiliency, which refers to the capacity to recover quickly from some form of adversity - be that Covid-19 infection, cyber-attack, natural disaster, geo-political tensions, and even cyber and kinetic conflict. Business leaders are increasingly understanding the benefits of taking steps to prevent business disruption because the pandemic has made it clear that businesses need to ensure resiliency at all levels to mitigate any disruption to normal business operations. Due to the increase reliance of businesses on...
1 2 3 4 5 6 7 Next