Tag: identity and access management
-
Ping Identity and Yubico Yubico and Ping Identity: Strengthening phishing-resistant MFA for a passwordless future Weak and stolen passwords often lead to security breaches and productivity losses due to password resets. The Ping Identity Platform, combined with YubiKey’s hardware security keys, enables robust, phishing-resistant multi-factor authentication, paving the way for a secure, passwordless future. This integration allows organizations to […] Read more identity and access management Ping Identity -
Yubico and Okta Organizations can combine the adaptive access management of Okta and YubiKey’s strong MFA to provide the right authentication for every situation. Read more authentication identity and access management Okta -
Duo Security and Yubico Duo and YubiKey deliver strong authentication that’s highly secure and easy for users Every user needs strong authentication to access vital applications, services, and data. Duo and YubiKey combine centralized, intelligent security policies, broad compatibility and easy integration with a consistent authentication flow users will appreciate. Together Duo and Yubikey share a focus on the […] Read more Duo security identity and access management -
Identity Access Management is more secure with YubiKey Integrating YubiKey with IAM solutions delivers the most secure level of authentication for all users Organizations looking to enhance their security posture can integrate their Identity Access Management platform with a YubiKey to provide hardware-based multi-factor authentication to all their users. This will not only provide the highest level of protection against phishing, but it […] Read more Duo security identity and access management Okta Ping Identity -
Cloud vs. On-Prem: Why on-prem can bring your next data breach Most CISOs and IT teams spend their time asking themselves “when”, not “if”, they will be the next company to suffer a data breach. And rightfully so. The frequency of data breaches is skyrocketing, with no sign of slowing down. To help quantify the problem, recent research from Canalys shows that there were more records […] Read more data breach digital transformation identity and access management -
Ping Identity partner brief PingID and YubiKey together comprise a modern MFA solution. Read more identity and access management MFA Ping Identity -
Okta partner brief The YubiKey and Okta Adaptive MFA provide the strongest level of identity assurance and defense against phishing and man-in-the-middle attacks, while also delivering a simple and seamless user experience Read more identity and access management MFA Okta -
Duo Security partner brief YubiKeys coupled with Duo MFA provide an easily understood, secure solution. Read more Duo security identity and access management MFA -
What is IAM (Identity and access management)? Identity and Access Management Identity and Access Management (often abbreviated IAM) is a combination of technologies, techniques, and policies employed by companies to manage conditional user access across elements of their tech stack. The form IAM takes can vary widely across different enterprises, but the two primary objectives of Identity and Access Management are undeniably […] Read more identity and access management MFA security -
Lessons from the SolarWinds incident Last week, a large and expertly run espionage operation was made public — one that began no later than October 2019, and which had been actively exploiting victims since at least early 2020. This incident is particularly interesting for several reasons: for the breadth of sensitive global government and industry targets, for misuse of a […] Read more identity and access management NIST security WebAuthn
1
2
Next Page