

Jim Ducharme
Contributor
Want to Join?
Opinions expressed by ICN authors are their own.
Jim Ducharme is Vice President of Identity Products at RSA. He is responsible for product strategy and leads the associated product management and engineering teams. He has nearly two decades of experience leading product organizations in the Identity marketspace, and has held executive leadership roles at Netegrity, CA and Aveksa.
The opinions expressed in this blog are those of Jim Ducharme and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.


Getting to know you: How continuous identity and access management transforms secure access
Better access decisions come from authentication solutions that work constantly to get to know users and resources better and better over time.

Strength in knowledge: How connected identity and access management transforms secure access
Connecting systems and sharing intelligence are key to fighting cybercrime—because even the most robust identity and access management solution can’t do it alone.

Here, there, everywhere: How pervasive identity and access management transforms secure access
When users are as likely to be working on the go as at their desks, and applications are as likely to be in the cloud as on-premises, you need identity and access management everywhere.

The path to modern authentication and cybersecurity is pervasive, connected and continuous
What makes secure access truly secure today? Authentication that works seamlessly – everywhere, all the time.

Transforming secure access to take on today’s cyber threats
Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.

Security and Convenient Access: Finding the Balance with Facial Recognition
Security or convenience? That is the question—at least when it comes to user authentication and access to resources. But with recent advances in facial recognition, the question is no longer an either-or proposition. Rather than...

Blurred Boundaries and New Methods: What’s Trending in Authentication
Remember when hardware tokens and complex passwords were the only ways to deliver secure access? Today, mobile and cloud applications are driving demand for convenient authentication methods to serve a large, diverse...
-
White Paper
-
White Paper
-
White Paper
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored