We catch-up with Andre Durand CEO of Ping Identity
A leading light in identity management wants users to have more control over their data
A sound blend of password management and unified authentication is the future of identity management
Kenya is about to unveil a digital system that will capture every citizen’s details. But there are glaring hurdles that the government cannot ignore.
In part two of our anonymity and online identity special we seek three industry professionals’ views on the ever changing role of identity management
In this technical brief, get eight recommendations to proactively address the problems of access control in a Microsoft-centric environment. Be proactive...
See how the Quest One Identity Solution addresses the challenges that arise in heterogeneous environments, and how Quest can help you meet these challenges....
This Gartner research paper provides guidance on the elements of an effective vulnerability program. Learn how to make your IT environment more resilient...
See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.
This whitepaper, “Defending the Internet of Things: Identity at the Core of Security”, discusses meeting the demand for an IoT architecture that achieves...
This white paper explores proven deployment methods and real-world use cases for deriving a mobile identity from an existing credential.
Entrust IdentityGuard Cloud Services consolidate the issuance and management of multipurpose smartcards, mobile credentials and USB tokens.
This IDC paper explores emerging trends in authentication that are driving a need for stronger user access control.
Read the Friends Life case study to learn how the company achieved these benefits.
Mark Chillingworth on IT leadership
Phil Muncaster reports on China and beyond
Kathryn Cave looks at the big trends in tech