NIST blog hero 3

NIST 800-63-B: Authentication and Lifecycle Management Guidelines

|
This is part three of a blog series on NIST-800-63-3 guidelines on Digital identity. Part one provides an introduction and overview of the overall guidelines, while part two goes in-depth into the Enrollment and Identity Proofing. This blog will add more color to NIST 800-63-B which explains in detail guidelines ... Read More
Leon's Tech Insight

Workday Credentials: Exciting Times for Identity and Authentication Assurance Vendors?

|
Workday recently announced Credentials, an advanced network of verified credentials powered by a blockchain-based credentialing platform. I’ve always held Workday’s product and engineering disciplines in very high regard, and this announcement cemented this perspective even further. This also got me excited about the possibilities this could have in the Identity ... Read More
NIST series post 2

NIST 800-63-A: Enrollment and Identity Proofing

|
In the first part of this blog series, we provided an introduction to the NIST 800-63-3 guidelines on Digital Identity. This second part continues that discussion and focuses on the first sub-section of those guidelines, 800-63-A, on Enrollment and Identity Proofing. A digital identity, as we discussed in our earlier ... Read More
NIST series post 1

NIST 800-63-3 Digital Identity Guidelines – A Primer

|
The National Institute of Standards and Technology (NIST), in June 2017, published a new set of guidelines as part of their special publication 800-63-3 that provided technical requirements for federal agencies implementing digital identity services. These guidelines have been instrumental in helping me and many others in the Identity and ... Read More
Idaptive Home Run

Idaptive, The Home Run Machine

|
“Yesterday’s home runs don’t win today’s games.” – Babe Ruth. Idaptive’s placement as one of the only two leaders in The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019 report two weeks ago, less than six months after its launch as an independent security SaaS company, was an incredibly exciting ... Read More
Verizon surprises

Cybersecurity Surprises In The Verizon Data Breach Investigations Report

|
Every year, Verizon publishes its Data Breach Investigations Report, one of the most prominent and respected reports in cybersecurity. This year, the 2019 report was the most extensive piece of research to date, offering findings based on analysis of 41,686 security incidents, including 2,013 breaches. The report is required reading ... Read More
Identity control hero

Identity Where You Can Control It!

|
Regardless of whether your data is stored in an on-prem directory or in a cloud one, if you’re using the Idaptive Next-Gen Access Cloud platform, you manage and secure your identity data. It’s 2019, and cloud is mainstream, ubiquitous and here to stay. Debates about whether cloud will become a ... Read More
Directory hero

Rethinking Your Approach to Your Enterprise Directory

|
Fueled by advances in technology and widely-recognized business benefits, many organizations today are actively moving to cloud-based applications, platform services and infrastructure as a service. This trend, coupled with an explosion in mobile computing, means that IT must increasingly enable access of these applications, services and infrastructure anytime, anywhere. There ... Read More