Simple Rules for Smart IAM Solutions

Simple Rules for Smart IAM Solutions

Evaluating IAM solutions can be complex. Understanding how to evaluate security analytics is key to making decisions. In this day and age of Machine Learning (ML), analytics systems can become very complex, very quickly. Having ... Read More
vpn hero image

Simple Rules for Implementing VPN for the Remote Workforce

|
When implementing VPN for your new remote workforce, it is critically important to ensure that users logging on to the VPN are verified to a high degree of assurance, devices are validated and the rights and entitlements are intelligently limited in line with the principle of least privilege. In the ... Read More
Five Simple Rules for Implementing VPN for the Remote Workforce

Five Simple Rules for Implementing VPN for the Remote Workforce

For many employees, the morning work routine looks a lot different than it used to. Instead of heading to the office, they make their coffee, “commute” to their home workspace and connect to a Virtual ... Read More
Smart IAM

The State of Smart IAM Solutions 2020

|
How AI, machine learning, and “clean” data will accelerate identity and access management (IAM) into the new decade. As most of us are just getting comfortable writing “2020” on checks and journal entries, the identity access management industry is far from settling down. The new year finds IAM undergoing a ... Read More
Simple Steps 3

Simple Rules for Smart IAM Solutions. – Part 3: Making Sense of Data, Risk Detection and Intelligently Leveraging It

|
In part 3 of this series on Simple Rules for Smart IAM Solutions, we will examine the most efficient ways in which we can slice and dice the data collected from the various contexts which will then be used to compute risk of the various users. In my last blog ... Read More
Simple Rules for Smart IAM Part 2

Simple Rules for Smart IAM Solutions. – Part 2: Contexts & The Data Science Behind

|
Part 2 in a series on understanding how to evaluate IAM solutions - let's dive into contexts and data science! In my last blog we covered the basic rules that can be used to evaluate IAM solutions that leverage User Behavior Analytics (UBA) and Machine Learning to adapt to risk ... Read More
Security analytics

Simple Rules for Smart IAM Solutions

|
Evaluating IAM solutions can be complex. Understanding how to evaluate security analytics is key to making decisions. In this day and age of Machine Learning (ML), analytics systems can become very complex, very quickly. Having some basic rules and seemingly simple questions to ask will come in handy when evaluating ... Read More
Verizon MFA hesitation hero

Getting Over MFA Implementation Hesitation

|
At Idaptive, we talk a lot about how multi-factor authentication (MFA) is a vital tool in a Zero Trust approach, the most promising strategy to keep an organization safe from breaches. We may even take it for granted that our audiences know exactly what we’re talking about with MFA and ... Read More
Leon's Tech Insight

Kickstarting Your Idaptive MFA Integration With Cortex By Palo Alto Networks

|
We’ll be in booth # 300F at Ignite19. Please come by our booth for a demo of Intelligent MFA for Cortex. Idaptive’s unique threat intel data ingestion architecture allows us to keep expanding our ecosystem of partners. This rich ecosystem of partners like Palo Alto Networks help us in augmenting ... Read More
Leon's tech insight

Adaptive MFA Using Analytics and Artificial Intelligence

|
As risk-aware security products powered by machine learning, artificial intelligence and big data technologies emerge and evolve, they will rightfully become part of the standard arsenal for enterprises in the fight against security breaches. In the context of Identity and Access Management, AI can provide security answers traditional solutions cannot ... Read More