Idenhaus Biweekly: Application Shielding, Data Security, ForgeRock Recap

Share on linkedin
Share on twitter
Share on facebook

Idenhaus Biweekly_ Data Security, ForgeRock Recap

Thanks for reading our biweekly roundup of insightful Identity Management, data security, & Cybersec articles. We curate a diverse selection of IAM, RBAC, GDPR, and Identity Governance articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.

 

ForgeRock IdentityLive Conference 2019: Balancing Data Security and User Experience via Idenhaus

One of my favorite sessions was USAA’s “Journey with ForgeRock” case study. The discussion and started with the powerful statement that “trust is our brand” and requires striking a delicate balance between security and the end user experience.

Why HR and IT Are Teaming Up to Prevent Data Breaches via CMSWire

Establishing a good program starts with ongoing education of your employees. Training and education surrounding data security cannot be a one-time or annual training course: it must pervade the culture of your company.

What Is Application Shielding? via Wired

When application shielding is used as a sort of suite of best practices to authenticate a user, check the integrity of an operating system, promote cryptographic checks like transaction signing, or confirm device identity it contributes to much-needed mobile defenses.

Industry Voices—Your hospital’s key card reader poses a cybersecurity risk. Here’s how to address it via Fierce Healthcare

Sharing data between physical access controls and cybersecurity solutions—such as identity and access management, network access control, or user and entity behavior analytics solutions—can help organizations more effectively detect suspicious user or device activities.

Data Security Controls: Primary Objective via Security Boulevard

Strong information security management calls for the understanding of critical principles and concepts such as data classification, change management/control, and protection mechanisms.

Reducing Your Legal Exposure After a Cybersecurity Incident  via Idenhaus

Here are 5 data security mistakes companies make following a cybersecurity event that significantly increase their legal exposure.

Role Based Access Control Best Practices [Webinar] via GoToWebinar

In this webinar, we will walk through our RBAC methodology, discuss lessons learned, and share best practices that you can employ in your organization.

 

Check out our previous digest of insightful Identity Governance and cybersecurity articles here: 8 Insightful Identity Governance & GDPR Articles, April 2019

 

 

An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *