Ultimately IDM can pay off in time and money Why Identity Managementn Reduced sign-on saves time for employees. In help desks, call centers and other places, time saved equals money saved.n Automatic user provisioning streamlines the process of establishing or transferring employees’ access to the resources they need.n Automatic deprovisioning means that once employees leave, their system access can be shut off quickly and efficiently. What to watch for:n If you’re planning on true single sign-on, think about stronger authentication. One lost password or laptop can create a lot more vulnerability. n Successful projects start small and address very specific business needs. More functions can be added over time. Think reduced sign-on, not single sign-on, for example.n Don’t overlook the process and politics components. Related content feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO CSO and CISO C-Suite news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe