Companies failing to heed warnings on employee deprovisioning, research warns

More than half of employees surveyed by identity management provider OneLogin admit they still have access to corporate applications from former employers.

The study, which was based on a survey of 500 US-based IT decision makers, found that almost half (44%) of respondents lack confidence that former employees have been removed from corporate networks. A quarter of those polled said their organisation takes more than a week to remove a former employee from their records, while another quarter did not know...

By James Bourne, 14 July 2017, 0 comments. Categories: Employees, Enterprise Mobility, Identity, Security.

Apperian unveils new password controls and single sign on in product update

Mobile app management (MAM) provider Apperian has announced updates to its platform with the aim of ‘increasing the security of enterprise mobile app data without compromising usability’.

The new capabilities include supporting single sign on with Touch ID on iOS devices, supporting the OAuth authentication protocol, as well as advanced password restrictions. The password restrictions include providing administrators with granular controls around password expiration time, password history, and how...

By James Bourne, 27 June 2017, 0 comments. Categories: Enterprise Mobility, Identity, MAM, Security.

Organisations starting to trust automated security, new research finds

The majority of executives polled by Radware say they trust automated security solutions with a third saying they trust automated cyber defence compared with humans.

The study, the 2017 Executive Application & Network Security Survey, was conducted by Merrill Research on behalf of Radware in April 2017, which surveyed 200 executives – 100 in the US and 100 in Europe. The report helps understand the threat landscape, potential impact on businesses, level of preparedness, emerging threats and...

By Enterprise CIO, 15 June 2017, 0 comments. Categories: CIO, Identity, Security.

No matter who you are – automating access governance solves a plethora of business problems

You think your organisation’s systems are secure. Your employees have the solutions they need to maintain security, and for them to do their jobs effectively. Your user accounts are being provisioned automatically and you provide self-service, so anyone who is locked out, for example, can immediately get back into their workstations and perform at the highest level. Your newly hired employees can quickly get started from moment one without delay, right, with proper access to the organisation’s...

By Dean Wiech, 02 May 2017, 0 comments. Categories: Employee Education, Employees, Identity.

Biometrics, the CIO’s challenge and how AI could finally improve mobile security

This publication once asked the question: is 2013 going to be the year of biometric security? While clearly something of an optimistic prediction, the past few years have been spent periodically lamenting the death throes of the traditional password, with seemingly minimal change.

But could we – finally – get the change the industry so desperately needs? Kevin Gilroy, executive vice president and head of Samsung Business, writes that...

By James Bourne, 31 March 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Identity, Security.

It’s time to re-energise IT – and make the IT department more than a M*A*S*H unit

(c)iStock.com/BrianAJackson

There’s no holding back the obvious truths in the land of IT. Helpdesks are inundated and overwhelmed; we are overworked and our teams are scrambling for some lucidity. The problem is simple, and most of us know: mundane, repeated and wearisome tasks that can, or probably should, be automated.

Much stress and time could be saved for our IT team’s employees by taking away some of these entanglements, but many organisations overlook doing so in the name of convenience...

By Dean Wiech, 07 February 2017, 0 comments. Categories: Employees, Identity, Security.

MobileIron introduces SSO for native apps to cure ‘app to cloud security’ gap

(c)iStock.com/ymgerman

Enterprise mobility management (EMM) software provider MobileIron has announced single sign-on (SSO) capability for its Access platform, which enables users to only input their passwords once across different applications.

“Enterprises embracing mobile and cloud services expect the same security and single sign-on capabilities to work for their native mobile apps as with web-based accessed from a PC,” wrote Vijay Pawar, MobileIron director of product management

By James Bourne, 22 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Identity.

Two recent examples of how digital has the potential to transform healthcare

(c)iStock.com/BrianAJackson

Whether it’s through applications, devices, or the data tying it all together, it’s evident that with the right path technology can transform healthcare. Two recent examples, from third sector technology provider Eduserv and open source tech giant Red Hat respectively, have shed some light on the challenges and opportunities the industry faces from both a European and American perspective.

The former comes through a recently released executive report – the second...

By James Bourne, 14 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Identity.

Why the future of identity is up in the clouds

(c)iStock.com/roberthyrons

In the last year, the volume of CIO mandates to be “cloud first” or only adopt cloud applications going forward, has increased significantly in large enterprises. Research from IDC forecasts that by 2019 enterprises will be spending more than £100 billion annually on cloud services.

When approached in the right manner, the cloud can deliver considerable benefits to organisations. But, there are several new challenges...

By Kevin Cunningham, 13 September 2016, 1 comment. Categories: CIO, Cloud , Identity.

The four steps to ensuring BYOD doesn’t affect the network

(c)iStock.com/pixsooz

A note from enterprise network security provider Hypersocket Software argues how wearable tech and wear your own device (WYOD), as well as the Internet of Things (IoT) are further challenges on the horizon for organisations struggling to cope with a BYOD infiltration.

Lee Painter, CEO of Hypersocket, notes four ‘essential’ steps for organisations to take to ensure network security in the BYOD age. “Personal devices should pose no greater danger than company-issued...

By James Bourne, 09 September 2016, 1 comment. Categories: BYOD, Enterprise Mobility, Identity, Security.