Access Control

Access Control | News, how-tos, features, reviews, and videos

Access control: A laptop displays an 'access granted' alert.
access control / authentication / privileges / security / key

Conceptual art: Creative collaboration while physically distancing during the COVID-19 pandemic.

Why COVID-19 will change identity management forever

Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.

Zero-trust / COVID-19 / pandemic

COVID-19 offers a unique opportunity to pilot zero trust, rapidly and at scale

A zero-trust model addresses many of the security concerns around supporting large numbers of remote workers, and new vendor free trials make fast deployment possible.

binary code flows around a corporate structure / cybersecurity / technology companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down.

Virgin Hyperloop One X-1 pod

How Virgin Hyperloop One protects its most precious data

VHO's high profile means its intellectual property is coveted by competitors, nation-states and curious hackers. Tightly controlled access is the key to protecting that data.

access management / access control / user connections / identities

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

CSO > colleagues writing on a glass wall / collaboration / teamwork

Peer product reviews: IT pros evaluate 7 enterprises offerings

These downloadable reports offer objective user-contributed product evaluations to help IT decision-makers navigate the tech purchase process.

Insider threats  >  Employees suspiciously peering over cubicle walls

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

access control / authentication / privileges / managing permissions

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

login credential - user name, password - administrative controls - access control - single sign-on

Best tools for single sign-on (SSO)

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.

8 authentication basics password identity protected security

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

new job roles

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role.

blue green abstract finger print identity bio security fingerprint

IAM for IoT: Taming the internet of threats

We don’t simply give users credentials and allow unfettered access to the network, why wouldn't we apply the same controls to a networked device?

cloud security

3 top multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security...

network of connections / digital matrix

Review: Protecting API connections with Forum Sentry

The Forum Sentry API Security Gateway goes beyond access control and deep into security, monitoring all the connections that it forms between systems and enforcing very granular security policies.

cloud security ts

Enhancing cloud security for AWS deployments

As organizations continue to move their IT infrastructure to AWS or other cloud providers, addressing complex access control use cases with dynamic authorization is essential.

eye retina scanner security identity access management

The best IAM software: Rating the top 10 products

Based on feedback from IT professionals, these are the best identity and access management products. Download the free PDF report to see how they rank from 1 to 10.

Load More
You Might Also Like