Email Alerts
-
IRM solution helps training provider secure critical assets
Information rights management (IRM) with Seclore’s FileSecure was PurpleLeap’s weapon of choice against the dangers of intellectual property leakage Case Study
-
Bank of India’s 2FA with mutual authentication goes beyond OTPs
Indian BFSI major Bank of India chose mutual authentication when it required a two factor authentication (2FA) solution. There’s been no looking back. Case Study
-
SSL VPN evaluation, implementation and management guide for India
Looking for the right SSL VPN? This customized evaluation guide designed for India will prove helpful. Buyer's Guide
-
UTM buying essentials for India Inc.
With capabilities like antivirus, IPS and anti-malware, a UTM can be handy for the SMB and branch offices. So how do we select the right UTM? Buyer's Guide
-
20 days to a more secure enterprise
Desktop administrators can improve the security of their organizations by doing a little each day. Learn how small steps can help you keep up. Step-by-Step Guide
-
Quiz: Compliance-driven role management
Use this five-question quiz to test your knowledge of role and entitlement management. Quiz
-
Reliance Capital's DRM and DLP team up for data protection
Skillfully sculpted document rights management (DRM) and data loss prevention (DLP) implementations help Reliance Capital battle growing data loss risks. Case Study
-
The intrusion prevention system selection guide for India
Deciding on an intrusion prevention system can be quite tricky. This guide will help you select the best IPS solution, and arm you with IPS management best practices. Buyer's Guide
-
Exploring authentication methods: How to develop secure systems
Use this guide to discover authentication options and learn how to implement, maintain and secure several methods of authentication, such as biometrics, single sign-on (SSO) and smart cards to avoid security breaches and protect sensitive corporate a... Learning
-
The New School of Enterprise Authentication
Burton Group's Mark Diodati examines the technologies that cutting-edge organizations use to redefine successful enterprise authentication. Identity and Access Manag
-
Hunting for application logic flaws requires people, expert says
Rafal Los, a software security expert and consultant with Hewlett Packard, says humans far outgun automated tools in the hunt for costly application logic flaws. News | 10 Apr 2012
-
Symantec acquires Nukona for MDM, mobile application control
Analyst says move is important step in addressing the need for mobile application control and document management capabilities. News | 20 Mar 2012
-
Seclore takes browser-based IRM route with FileSecure update
Releases browser-based information rights management (IRM) system, with its latest FileSecure update. Seclore claims this is world’s first browser-based IRM. News | 20 Sep 2011
-
Amazon launches new cloud identity management functionality
AWS customers can now use their existing identity management systems. News | 11 Aug 2011
-
RSA readies changes to SecurID delivery processes in wake of APT attack
Some say new protections in the SecurID manufacturing and shipping processes may be an effort to mitigate the loss of secret keys used to generate one-time passwords. News | 15 Apr 2011
-
Most identity and access management (IAM) approaches flawed: Gartner
Current fixation on first meeting production requirements detrimental to identity and access management strategies; suggests treating IAM as a process. News | 16 Feb 2011
-
Information rights management secures Asian Paints’ critical data
The story of how information rights management rollout helps Asian Paints protect its critical legal documents, R&D; whitepapers, and intellectual property. CASE STUDY | 04 Feb 2011
-
Biometric authentication technology curbs microfinance org’s losses
Growing Opportunity implements biometric authentication technology to overcome financial losses resulting from duplicate loan applications. News | 14 Jan 2011
-
Critical threats to UID security
The Unique Identification (UID) project aims at providing a unique number to every Indian. We try to analyze some of the key UID security threats and issues. Feature | 27 Oct 2010
-
Report: Cybercrime, identity theft techniques many and varied
When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. Article | 05 Oct 2010
- See More: News on Identity management, authentication and access control solutions
-
Leading Indian banking portals contain glaring security lapses
Even as Internet banking portals transform the way Indians bank, vulnerabilities exist in banking websites like SBI, Citibank India, HDFC Bank and ICICI Bank. Tip
-
Limitations of two factor authentication (2FA) technology
The common two factor authentication (2FA) techniques used In India have several shortfalls. We take a look at security risks associated with 2FA solutions. Tip
-
POS terminal security: Best practices for point of sale environments
Securing point of sale (POS) environments can be tricky. Shobitha Hariharan and Nitin Bhatnagar share comprehensive POS terminal security best practices. Tip
-
Biometric authentication methods: Comparing smartphone biometrics
Biometric authentication helps ensure only authorized smartphone users can access a network. David Jacobs weighs the pros and cons of three methods. Tip
-
Examining use of IRM solutions for access control in data extraction
IRM solutions can be integrated with transactional systems to ensure protection of extracted data by setting predefined access policies in the IRM solution. Tip
-
Create a BlackBerry security policy based on BES or BES Express
Mobile security expert Lisa Phifer outlines the many ways security solution providers can secure their customers’ BlackBerry devices. Tip
-
IAM solution implementation: Challenges & resolution
IAM solution implementation programs must be carefully managed, lest they hit roadblocks due to over-ambitious objectives or uneducated stakeholders. Tip
-
Identity and access management (IAM) program implementation guidelines
The first part of this identity and access management (IAM) program guide details how to optimally structure the implementation’s foundation. Tip
-
10 identity and access management (IAM) implementation mistakes
An overview of the common issues organizations overlook while deploying an identity and access management (IAM) solution. Tip
-
Evaluating options for portable hard drive and USB key encryption
To protect your customers' data on portable media, should you choose a hardware or software encryption solution? Security expert Joel Snyder compares your options. Tip
- See More: Tips on Identity management, authentication and access control solutions
-
How to prevent SSH brute force attacks
Brute force attacks on the Secure Shell (SSH) service have been used more frequently to compromise accounts and passwords. Expert John Strand explains how to defend against these brute-force threats. Ask the Expert
-
10 robust USB drive security tools for India Inc
USB drives are ubiquitous in Indian businesses, but pose security threats as they are easily lost/stolen. Here are 10 tools to ensure robust USB security. Photo Story
-
Default deny security: How to implement a positive security model
What is 'default deny' security? How difficult is the implementation process, and how could you sell it to executives? In this video, expert Mike Rothman explains how a positive security model works and how to decide if it's right for your enterprise... Video
-
Malware and email authentication for financial services
Malware and fighting phishing with email authentication are major security topics for financial services firms. In part two of this video, Paul Smocer discusses the threats and mitigation options. Video
-
The integration challenges of unified threat management (UTM)
In this video, Joel Snyder of Opus One reviews how unified threat management products integrate with host-based protection and network access control devices. Video
-
10 robust USB drive security tools for India Inc
USB drives are ubiquitous in Indian businesses, but pose security threats as they are easily lost/stolen. Here are 10 tools to ensure robust USB security. Photo Story
-
Leading Indian banking portals contain glaring security lapses
Even as Internet banking portals transform the way Indians bank, vulnerabilities exist in banking websites like SBI, Citibank India, HDFC Bank and ICICI Bank. Tip
-
Limitations of two factor authentication (2FA) technology
The common two factor authentication (2FA) techniques used In India have several shortfalls. We take a look at security risks associated with 2FA solutions. Tip
-
IRM solution helps training provider secure critical assets
Information rights management (IRM) with Seclore’s FileSecure was PurpleLeap’s weapon of choice against the dangers of intellectual property leakage Case Study
-
POS terminal security: Best practices for point of sale environments
Securing point of sale (POS) environments can be tricky. Shobitha Hariharan and Nitin Bhatnagar share comprehensive POS terminal security best practices. Tip
-
Biometric authentication methods: Comparing smartphone biometrics
Biometric authentication helps ensure only authorized smartphone users can access a network. David Jacobs weighs the pros and cons of three methods. Tip
-
Hunting for application logic flaws requires people, expert says
Rafal Los, a software security expert and consultant with Hewlett Packard, says humans far outgun automated tools in the hunt for costly application logic flaws. News
-
Symantec acquires Nukona for MDM, mobile application control
Analyst says move is important step in addressing the need for mobile application control and document management capabilities. News
-
Bank of India’s 2FA with mutual authentication goes beyond OTPs
Indian BFSI major Bank of India chose mutual authentication when it required a two factor authentication (2FA) solution. There’s been no looking back. Case Study
-
Examining use of IRM solutions for access control in data extraction
IRM solutions can be integrated with transactional systems to ensure protection of extracted data by setting predefined access policies in the IRM solution. Tip
- See More: All on Identity management, authentication and access control solutions
About Identity management, authentication and access control solutions
Ensure effective authentication and access control mechanisms for your IT infrastructure. Learn access control basics and identity management policies with eGuides. Get expert advice on how to integrate access controls or explore identity management tips. Set up an authentication server or authenticate across systems with a single identity management solution. Get whitepapers, case studies, podcasts and webcasts on identity management, authentication and access control solutions.