Archive for: April 2019

Why SaaS Requires Strong Privileged Access Management

Software-as-a-Service (SaaS) delivers real business benefits, including reduced capital and operational overhead, continuous software updates, and simplified remote access. However, many IT decision-makers are concerned their organizations aren’t doing enough to secure cloud-based solutions. In a recent study conducted by Vanson Bourne, 64 percent of IT decision-makers said their “organization’s SaaS adoption is outpacing their ability to secure it.”...

Research Digs into Privileged Access Management Capabilities and Challenges

Traditionally, workers relied on IT teams to provide privileged access to the resources needed to perform tasks. Today, workers demand unprecedented rights to perform tasks on servers, applications, data, and other IT resources. While privileged access can increase user freedom and productivity and reduce administrative efforts and costs, security requirements are rarely a consideration. The key is to determine...

Why Identity Governance Is Ripe for a “Shift Left” Approach

As organizations seek to bolster security and improve the user experience, the “Shift Left” movement is gaining steam. The term actually has a number of definitions, depending on context. In software development, where it originated, Shift Left refers to an approach in which testing is done earlier in the process — that is, it is shifted left on the...

Why Risk Analytics Is an Essential Component of Modern Identity Management

Risk management is a five-step process that always starts with identification. It’s common sense; you have to determine what risks are involved before you can evaluate, prioritize, mitigate, and monitor them. With identity and access management (IAM), however, identifying risks can be a difficult process. An enterprise with 1,000 employees and 25 IT systems that each have 10 levels...