Melanie Sommer

Melanie brings nearly 20 years of experience in the technology industry with a focus on security, data protection and identity management. Today, she leads the global marketing efforts for RSA’s identity management products. Prior to joining RSA, Melanie held leadership positions in both early-stage technology start-ups and some of the world’s largest technology companies, including Dell EMC, Motorola, IBM/Tivoli, Sun Microsystems, and Compaq Computer.

Why Identity and Access Management is Crucial for Digital Transformation

3 Essential Connections for Identity Assurance

3 Essential Connections for Identity Assurance

You’ve heard the expression “no man is an island”? When it comes to identity solutions, you can expand on that to say no user is an island, no application is an island, no IT team is an island. Building connections across all the...

Identity Trends 2018: The More Things Change, the More Things…Change

What’s changing about how organizations manage identities and access in 2018? You’d probably do better to ask what’s not changing. With credentials-based attacks on the rise since last year (growing from 63% to 81% of all cyber...

4 Key Identity and Access Management Priorities and Investment Drivers

4 Key Identity and Access Management Priorities and Investment Drivers

What drives your decisions around identity and access management (IAM)? According to the 2016 IDC Global Identity Management Assessment Survey, if you’re looking at an IAM solution, you’re likely most interested in one of four...

Don’t Get Tripped Up; 4 Tips for Secure, Convenient Authentication

Don’t Get Tripped Up; 4 Tips for Secure, Convenient Authentication

More kinds of user authentication options are available today than ever before—two-factor, multi-factor, mobile, push, tokenless, biometric. That’s the good news. But if you’re not careful, it can be bad news, too. No one wants to...

3 Keys to Easier Multi-Factor Authentication for Everyone

3 Keys to Easier Multi-Factor Authentication for Everyone

Multi-factor authentication (MFA) is a great tool for keeping cyber attackers out of your data. But using it successfully can be a balancing act between making it hard for attackers to get in and making MFA easy for users and...

3 Ways to Keep Your Data Private When You’re in Public

3 Ways to Keep Your Data Private When You’re in Public

Public Wi-Fi has made it easier than ever to be productive no matter where you are – at the airport, in a coffee shop and, in some communities, even just sitting on a park bench. But that productivity can come at the cost of...

3 Access Blind Spots That Can Put You at Risk

3 Access Blind Spots That Can Put You at Risk

With more applications moving to the cloud and more users on the move, it’s becoming increasingly hard to see where inappropriate access may be a threat to your organization. If you want to keep from being blindsided, you need to...

Identity Challenges in the Cloud

Identity Challenges in the Cloud

Organizations are moving more and more applications and other resources to the cloud. In fact, a recent study by Osterman Research found that 68% of organizations are storing at least some or even all their sensitive corporate...

Load More