Authored by Mike Conti, Product Marketing Manager To increase flexibility and boost competitiveness, organizations have eagerly embraced a growing diverse population of consultants, partners, vendors, and other contingent labor, as well as non-human technologies like service accounts, bots, and smart devices. But it’s often difficult to gauge the maturity level of managing...
The Identity Blog
Gartner Identity & Access Management Summit is next Monday, and we can’t wait. This annual event helps IAM and security leaders decide which identity-first security initiatives to prioritize, how to modernize existing staffing models, and whether to invest in new tools to take their organization’s security posture into the identity-first era. Have questions? Check out our ...
Authored by Cameron Wilson, Product Marketing Manager Even though the pandemic made it feel like time is a flat circle, this is not true, especially regarding access controls, for which timing is vital. So what are access controls, you ask? Access controls certify authentication (users are whom they state they are) and authorization (they have suitable access to company da...
Have you ever stopped to look at something and thought, “Hm, that doesn’t look right”? Maybe it’s the painting hanging on the wall in your living room and you notice it’s slightly off-center one day as you’re packing up to leave for work. Or maybe it’s the project at work you’ve been working on for months, and you’ve hit a standstill. You step back and revisit all the wor...
March 8 is International Women’s Day and a time to celebrate the achievements of all women everywhere. Today, we are highlighting one of our newest crew members, Wendy Shepperd, SVP of Engineering. Wendy shares how she got started in cybersecurity, the significant role cybersecurity plays in our world today, how she supports an equitable work environment, and her dream to ...
Are you attending Gartner’s Identity & Access Management Summit 2023 in London, U.K., next week? We are too! Gartner Identity & Access Management Summit 2023 helps IAM and security leaders decide which identity-first security initiatives to prioritize, how to modernize existing staffing models, and whether to invest in new tools to take their organization’s security posture...
Developer Days 2023, our inaugural conference for developers, is happening March 7th-9th! First time hearing about Developer Days? We thought we’d give you some information to prepare for the best conference experience. Below are tips and tricks to getting the most out of your experience at Developer Days 2023. Who is presenting at Developer Days? Developer Days is made u...
Authored by Jaishree Subramania, Vice President of Product Marketing In mylast blog covering our Horizons of Identity Security research report, I touched on the five distinct horizons of identity security and the key enablers that determine where an organization sits in its identity journey. Today, I’ll touch on another aspect of the report: why investing in identity secur...
Authored by Kelly Grizzle, Distinguished Engineer The digital landscape is changing quickly. The number of apps in use by the average enterprise increased by 20% in 2020, according to a recent Netskope threat report. Organizations with 500-2,000 employees now use approximately 700 cloud apps monthly. Data shows us that security teams manage access to hundreds of applicatio...
On-demand sessions discussing the state of government identity security Government agencies need to automate and modernize identity security programs and processes to keep up with today’s accelerating modern digital age. The recent iD.gov virtual summit covers quality identity security content from federal, defense, state, and local public sector leaders. Discover how to ...