How do we establish and maintain digital trust without burdening our users? What are the critical questions that need to be addressed by anyone managing identity and access management in a modern enterprise? David Duncan of CA Technologies offers answers to these questions.
IT organization's must deal with highly distributed identities across the entire business environment that come from many sources - applications, systems, social media, etc. Additionally, mobile employees and customers are changing the face of business and redefining the challenge of delivering secure applications...
Managing user access has been a top-of-mind concern for IT and security experts for years, but the realities of today's application economy have recently made it a more urgent and challenging topic to address. This is especially true for customer- and partner-accessed applications, because the proliferation of mobile...
When an employee exits, it's essential to ensure their access rights don't go with them. Too often, however, organizations fail to track who's joining, leaving or changing roles, leaving them at increased risk of malicious activity.
At CA Technologies, mobile security is not just a solution for customers; it's a practice that IT security leaders have embraced internally. CA's Robert Primm discusses how to secure a borderless workplace.
Amidst a year of high-profile and costly data breaches, what can organizations be doing to help ensure they aren't the next victims? Charley Chell of CA Technologies discusses new authentication solutions.
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.