In this short video, Enterprise Management Associates (EMA) analyst Steve Brasen highlights a four-phased approach to adaptive access management. Each of the four phases (basic, enhanced, advanced and adaptive) aim to help organizations make tactical decisions as they transition to adaptive access.
Recommended for You

Lani Refiti, Co-Founder and CEO at IoTSec Australia and Jeffery Kok, VP of Solution Engineers at CyberArk discuss the rapid expansion of IoT capability and the arrival of 5G in Australia.

Release 21.2 adds support for Google Cloud Platform provisioning and additional settings for reCAPTCHA service integration.
"CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts and revoke access when necessary."
"CyberArk Identity Adaptive MFA provides additional layers of security and helps protect organizations against the leading cause of data breaches — compromised credentials."
"CyberArk Identity App Gateway provides an easy and secure way to access on-premises applicaitons without requiring VPN client configurations, modifying firewall policies, or changing application code
Download this white paper to understand five actionable tips that will help you scale and secure your remote workforce without making it difficult or painful for your employees to work.
"CyberArk Identity Single Sign-On is a cloud-based Identity-as-a-Service solution designed to simplify identity management and provide secure access to corporate resources with one set of credentials

Release 21.1 adds support for delegated web app administration, single sign-on to AWS Management console, single-factor authentication using QR codes, and more.

Understand the key components of a modern Identity Security approach that empowers users with access to everything they need – while giving you peace of mind your assets are safe.

Release 20.7 adds support for CyberArk Alero integration, passwordless authentication using QR codes, and on-demand MFA policies.
This paper examines six common risks of this “perimeterless” IT environments and proposes six opportunities to strengthen security using Identity Management Solutions.

Release 20.6 adds support for custom user provisioning SCIM schema, enhanced Cloud Directory user search, the ability to drill down into the risk level information of specific users, and more.

While it’s widely accepted that the “perimeter is dead,” current realities are forcing many organizations to evolve their security approaches faster than planned. Traditional firewall and...

Release 20.5 adds support for token-based authentication for Office 365, MFA for servers secured by CyberArk Privileged Session Management, and enhanced provisioning for UltiPro.

A Look Back: The Sprint to Remote Work Created Security Gaps The global shift to remote work happened fast: millions of employees went home last March and adjusted to new ways of working – thanks...

An employee’s work laptop can be a treasure trove for any malicious actor who can get access to it. Think about it. Many of the apps you use on your laptop don’t ask you for credentials,...

Release 20.4 adds support for Azure AD as a directory source, enhanced provisioning for UltiPro, and a major UI update.

The COVID-19 pandemic has turned working from home from a perk to an everyday reality. These changes are permanent, and they require a new security perspective. The chaos of the first few months...

From the philosophy behind it, to the technology that powers it, at Idaptive we’ve talked about Zero Trust a lot (see the list of the entire Zero Trust blog series at the bottom of this post)....