How Recent Changes In Identity Management Help Businesses To Better Secure Their Systems And People
Organizations have invested considerably in their digital transformation initiatives. Analyst firms estimate hundreds of millions have been earmarked in recent years to move to cloud computing, digitize business processes, and improve customer experiences to stay competitive and relevant. It makes ...
Continue ReadingIdentity is Not the New Perimeter!
A few years ago, we all were bombarded by marketing campaigns from identity management (IDM) software vendors stating that the “Identity is the new Perimeter.” While that sounds good and sells well to CISOs and CIOs, it is a little simplistic and misleading. I believe that identity is just a ...
Continue ReadingIntroduction to Endpoint Privilege Management (EPM)–Part III
Hello and welcome back to my blog series on Endpoint Privilege Management. This is the third and final installment covering common requirements and the features they map to, what’s involved in deploying and maintaining a solution, and how to work with a vendor to do a POC ...
Continue ReadingIntroduction to Endpoint Privilege Management (EPM)–Part II
Hello and welcome to the second of a three-part blog post series covering Endpoint Privilege Management (EPM). If you’ve stumbled across this and are unfamiliar with the topic, you may want to check out Part I for a high-level overview; otherwise, let’s go ahead and jump right in. How does ...
Continue ReadingEndpoint Privilege Management – Starting a Blog Series
Hello and welcome to a new blog post series covering Endpoint Privilege Management (EPM) and the challenges (and benefits) related to managing user privileges. Over the next several weeks, I’ll be covering various aspects of what we at Set Solutions have learned evaluating and deploying EPM ...
Continue Reading