We catch-up with Andre Durand CEO of Ping Identity
A leading light in identity management wants users to have more control over their data
A sound blend of password management and unified authentication is the future of identity management
Kenya is about to unveil a digital system that will capture every citizen’s details. But there are glaring hurdles that the government cannot ignore.
In part two of our anonymity and online identity special we seek three industry professionals’ views on the ever changing role of identity management
This Gartner research paper provides guidance on the elements of an effective vulnerability program. Learn how to make your IT environment more resilient...
See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.
This whitepaper, “Defending the Internet of Things: Identity at the Core of Security”, discusses meeting the demand for an IoT architecture that achieves...
This white paper explores proven deployment methods and real-world use cases for deriving a mobile identity from an existing credential.
Entrust IdentityGuard Cloud Services consolidate the issuance and management of multipurpose smartcards, mobile credentials and USB tokens.
This IDC paper explores emerging trends in authentication that are driving a need for stronger user access control.
Read the Friends Life case study to learn how the company achieved these benefits.
This white paper provides an overview of the goals, approach, and benefits of Provisioning 2.0.
Adrian Schofield sheds light on tech in South Africa
Mark Chillingworth on IT leadership
IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.
Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.