Quantcast
Channel: Blog Posts From Dell Identity and Access Management Tagged With authentication
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Enterprise software apps as we know them aren't dead (yet)

I finally did it.  I replaced my blackberry with a smart phone, an iPhone 4S.  Yes, Siri has impressed me and I see a bright future for voice recognition.  After using my new phone for just a week or...

View Article



Learn best practices from the experts at TEC. Join us for a new customer...

Exclusive Training and Networking Events for Quest One Identity Solutions CustomersWant to learn best practices from the experts and network with your peers at TEC? Join us for a new customer...

View Article

Learning from the @LinkedIn hack - improve your password policies with an...

Unless you've been in a self imposed media blackout, you've heard that LinkedIn has been hacked and there are lists of usernames and passwords out in the open. If this is the first you've heard about...

View Article

Yahoo! & #password #security - eat your veggies?

By now you’ve read all about the Yahoo breach – if you haven’t here are a few places to catch up on the story. All read up? Good. I was discussing this with a friend yesterday and he parroted some of...

View Article

The APT, IAM, & PAM connection

There has been a lot of connections being made between APTs and how IAM, specifically Privileged Account Management (PAM), can help break the bad cycles that allow these long term threats to get a hold...

View Article


Use #IAM to take the right obscurity out of #security

Reading Michael Lee’s ZDNet piece “Killing Security Through Obscurity to Defeat Competitors”, I couldn’t help thinking that the missing piece was user friendly IAM. When you want to make security less...

View Article

The @Dell & @Quest_IAM chance to improve #security & #identity

When we talk to customers about IAM, one of the biggest events they point to that causes a wave of IAM activity is a merger or acquisition. There are user identities to migrated and consolidated. There...

View Article

Cyber Monday - Great online deals on security breaches!

In terms of finding online deals, Cyber Monday is the one day of the year on which a savvy shopper can get the majority of their holiday shopping done before they even break for lunch! In the business...

View Article


Survey results on Unix/Linux and Mac Authentication

It’s time to share my notes, quotes, and observations concerning a recent survey we did with our US customer base concerning Linux/Unix/Mac Authentication.  This survey was targeted at customers who...

View Article


Facebook's role still evolving in the workplace

It’s well-known that most employees have a dozen or more different accounts inside a big company. For example there is your Active Directory account, your Oracle expense account, SalesForce accounts,...

View Article

Three Ways Two-Factor Authentication Can Stop APTs from Spreading

It’s an unfortunate reality. Once advanced persistent threat (APT) attackers gain access to a single-factor password based authentication system, it’s relatively easy for them to spread their chaos....

View Article

#IAM Myth Busting: Active Directory - toy or titan?

An old myth accepted as fact: Active Directory is something between a huge burden or a neat toy, but it isn't up to the job for meeting my big directory and identity needs. It’s hard to count the...

View Article

#IAM Myth Busting: #SaaS will melt #security instantly

The myth in the studio with us today: Cloud based SaaS apps are going to break all your security and provisioning protections. Change is the world’s only constant. Just when you have all the IT systems...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images