Security

How to Protect the Enterprise IAM from Cyberattacks

Provided by ThreatMetrix

Category Security

Type Video

Length

Publish Date March 04 2016

Date posted August 04 2016

Overview

Recent data shows that cyber-attacks are not only increasing in volume but are in complexity. At the same time employee owned devices, mobile workers, externally hosted platforms and connected customers are driving a need for increased flexibility and increased business fluidity. Business managers and IT decision makers require practical solutions that will extend their existing identity management investments and augment their existing access control infrastructure.

In this on demand webinar, you'll learn:

  • The primary attack patterns used to by cybercriminals
  • Cover the expanded scope of identity management and ways to achieve the expanded coverage
  • Tips to harden existing access control and authentication systems against cyberattacks

Blogs

adrian-schofield

South African ICT

The thorny issue of internet freedom across Africa

Adrian Schofield sheds light on tech in South Africa

martin-veitch-thumbnail

My day in the Jeff Bezos and Amazon forest

Martin Veitch's inside track on today’s tech trends

phil-muncaster

China Rising

Why WannaCry might make Microsoft cry in China

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should we donate our health data the same way we donate organs?