Quantcast
Channel: Identity and Access Management – Aberdeen Essentials
Browsing latest articles
Browse All 9 View Live

The Devil’s Dictionary for IT and IT Security: Two-Factor Authentication

Access Denied. (But I typed in the credentials right). Access Denied. (You’ve got to be kidding me. One more time.). Access Denied. (That’s it…this computer is going out the window). Your two-factor...

View Article



Stat of the Week: Rise of the User in IAM

Identity and Access Management (IAM). When many people think of IAM, it conjures up images such as IT revoking access privileges from users the moment they leave an organization. But the Best-in-Class...

View Article

Image may be NSFW.
Clik here to view.

IAM Investing for Success — Are You?

In its research report, IAM Beyond Control, Compliance, and Cost: The Rise of the User, Aberdeen Group described how the strategic focus for enterprise identity and access management (IAM) systems has...

View Article

Image may be NSFW.
Clik here to view.

IAM Focused On Users, and Getting Results

In the blog IAM Investing for Success — Are You?, Aberdeen Group described insights from its Q4 2015 study on Identity and Access Management (IAM), which examined the use, experiences, and intentions...

View Article

Image may be NSFW.
Clik here to view.

How to Ensure Proper SSH User Key Management

Secure Shell (SSH) key management is a critical security issue. After all, SSH keys act as a password of sorts to grant entry into an organization’s operating system. As organizations tackle the...

View Article


Image may be NSFW.
Clik here to view.

Taking Control of Your Privileged Access Management

Privileged access management (PAM) has, by and large, always been a difficult topic for the enterprise. Now that cloud and IT services are being outsourced more often, PAM challenges are taking center...

View Article

Image may be NSFW.
Clik here to view.

The Security and Compliance Implications of SSH User Keys

Consider this true story: An auditor asked a developer how he gained access to his development environment to perform his daily tasks. The developer explained that the process involved going through a...

View Article
Browsing latest articles
Browse All 9 View Live




Latest Images