Idaptive

  • CyberArk Idaptive Release 20.7

    CyberArk Idaptive Release 20.7

    Release 20.7 adds support for CyberArk Alero integration, passwordless authentication using QR codes, and on-demand MFA policies.

    Read Article
  • Six IT Security Risks in a Perimeterless World

    Six IT Security Risks in a Perimeterless World

    This paper examines six common risks of this “perimeterless” IT environments and proposes six opportunities to strengthen security using Identity Management Solutions.

    Read Flipbook
  • Idaptive Release 20.6

    Idaptive Release 20.6

    Release 20.6 adds support for custom user provisioning SCIM schema, enhanced Cloud Directory user search, the ability to drill down into the risk level information of specific users, and more.

    Read Article
  • Four Reasons to Strengthen Identity Security with SSO

    Four Reasons to Strengthen Identity Security with SSO

    While it’s widely accepted that the “perimeter is dead,” current realities are forcing many organizations to evolve their security approaches faster than planned. Traditional firewall and...

    Read Article
  • Idaptive Release 20.5

    Idaptive Release 20.5

    Release 20.5 adds support for token-based authentication for Office 365, MFA for servers secured by CyberArk Privileged Session Management, and enhanced provisioning for UltiPro.

    Read Article
  • Transitioning to Adaptive Access Management5:09

    Transitioning to Adaptive Access Management

    In this short video, Enterprise Management Associates (EMA) analyst Steve Brasen highlights a four-phased approach to adaptive access management.

    Watch Video
  • Don’t Stop Risk Distancing. Remote Work Is Here to Stay

    Don’t Stop Risk Distancing. Remote Work Is Here to Stay

    A Look Back: The Sprint to Remote Work Created Security Gaps The global shift to remote work happened fast: millions of employees went home last March and adjusted to new ways of working – thanks...

    Read Article
  • Why Desktop MFA is Essential to Your Endpoint Security

    Why Desktop MFA is Essential to Your Endpoint Security

    An employee’s work laptop can be a treasure trove for any malicious actor who can get access to it. Think about it. Many of the apps you use on your laptop don’t ask you for credentials,...

    Read Article
  • Idaptive Release 20.4

    Idaptive Release 20.4

    Release 20.4 adds support for Azure AD as a directory source, enhanced provisioning for UltiPro, and a major UI update.

    Read Article
  • Are Current Work From Home Security Measures Enough?

    Are Current Work From Home Security Measures Enough?

    The COVID-19 pandemic has turned working from home from a perk to an everyday reality. These changes are permanent, and they require a new security perspective. The chaos of the first few months...

    Read Article
  • Grow Up! Plotting Your Path Along the Zero Trust Maturity Model

    Grow Up! Plotting Your Path Along the Zero Trust Maturity Model

    From the philosophy behind it, to the technology that powers it, at Idaptive we’ve talked about Zero Trust a lot (see the list of the entire Zero Trust blog series at the bottom of this post)....

    Read Article
  • Friction-Free Experience vs Secure Access: Lessons From the “Zoombombing” Fallout

    Friction-Free Experience vs Secure Access: Lessons From the “Zoombombing” Fallout

    The controversy and fallout resulting from the widespread reporting of bad actors gaining access to Zoom meetings is just another example of the constant struggle faced by developers and designers...

    Read Article
  • “Should I Stay or Should I Go?” Artificial Intelligence (And The Clash) has the Answer to Your Employee Access Dilemma.

    “Should I Stay or Should I Go?” Artificial Intelligence (And The Clash) has the Answer to Your Employee Access Dilemma.

    What happens when employees have access to data, apps or services that they shouldn’t? Best case scenario: they might know the salaries of all their colleagues and company execs. Worst case...

    Read Article
  • True Passwordless? Show me…

    True Passwordless? Show me…

    Passwordless is more than a buzzword. Idaptive has been granted a key patent in Passwordless technology by the United States Patent Office: Zero sign-on using a web browser. Passwordless is a...

    Read Article
  • Five Simple Rules for Implementing VPN for the Remote Workforce

    Five Simple Rules for Implementing VPN for the Remote Workforce

    For many employees, the morning work routine looks a lot different than it used to. Instead of heading to the office, they make their coffee, “commute” to their home workspace and connect to a...

    Read Article
  • The One-Two Punch of Zero Trust. Verify Every User, Validate Every Device.

    The One-Two Punch of Zero Trust. Verify Every User, Validate Every Device.

    Date breaches most often originate from a remote endpoint or device that shouldn’t have access to the breached resources in the first place — often involving nothing more than a stolen username...

    Read Article
  • Self-Sovereign Identity: A Distant Dream or an Immediate Possibility?

    Self-Sovereign Identity: A Distant Dream or an Immediate Possibility?

    To help solve the identity problem, enter Self-Sovereign Identity (SSID), which enables users to own, control, and present their identity data as needed all the while enabling service providers to...

    Read Article
  • Simple Rules for Smart IAM Solutions. – Part 3: Making Sense of Data, Risk Detection and Intelligently Leveraging It

    Simple Rules for Smart IAM Solutions. – Part 3: Making Sense of Data, Risk Detection and Intelligently Leveraging It

    In part 3 of this series on Simple Rules for Smart IAM Solutions, we will examine the most efficient ways in which we can slice and dice the data collected from the various contexts which...

    Read Article
  • Why Worrying About Election Security Only During Election Season Is Part of The Problem

    Why Worrying About Election Security Only During Election Season Is Part of The Problem

    Year-round awareness and careful communication, coupled with common sense cybersecurity practices like multi-factor authentication and a Zero Trust perimeter, are the best defense against the...

    Read Article
  • Passwords Need Fixing. Adaptive MFA Everywhere is the Solution.

    Passwords Need Fixing. Adaptive MFA Everywhere is the Solution.

    Ask an average person to identify the most common cause of data breaches and they are more likely than not to echo the terrifying headlines they’ve read about: sophisticated state-sponsored...

    Read Article
  • loading
    Loading More...