EyeLock enters into licence agreement with Qualcomm for mobile security suite

EyeLock, an iris-based identity authentication technology provider, has entered into a licence agreement with Qualcomm Technologies for Qualcomm Mobile Security.

The company, a subsidiary of VOXX International Corporation, is developing iris authentication solutions that are designed to work with Qualcomm’s Mobile Security suite, and to benefit OEMs across the entire IoT spectrum from one of the secured iris authentication implementations available in the market.

The Qualcomm Mobile Security is...

By Enterprise CIO, 04 August 2017, 0 comments. Categories: Authentication, Identity, Security.

Companies failing to heed warnings on employee deprovisioning, research warns

More than half of employees surveyed by identity management provider OneLogin admit they still have access to corporate applications from former employers.

The study, which was based on a survey of 500 US-based IT decision makers, found that almost half (44%) of respondents lack confidence that former employees have been removed from corporate networks. A quarter of those polled said their organisation takes more than a week to remove a former employee from their records, while another quarter did not know...

By James Bourne, 14 July 2017, 0 comments. Categories: Employees, Enterprise Mobility, Identity, Security.

Apperian unveils new password controls and single sign on in product update

Mobile app management (MAM) provider Apperian has announced updates to its platform with the aim of ‘increasing the security of enterprise mobile app data without compromising usability’.

The new capabilities include supporting single sign on with Touch ID on iOS devices, supporting the OAuth authentication protocol, as well as advanced password restrictions. The password restrictions include providing administrators with granular controls around password expiration time, password history, and how...

By James Bourne, 27 June 2017, 0 comments. Categories: Enterprise Mobility, Identity, MAM, Security.

Organisations starting to trust automated security, new research finds

The majority of executives polled by Radware say they trust automated security solutions with a third saying they trust automated cyber defence compared with humans.

The study, the 2017 Executive Application & Network Security Survey, was conducted by Merrill Research on behalf of Radware in April 2017, which surveyed 200 executives – 100 in the US and 100 in Europe. The report helps understand the threat landscape, potential impact on businesses, level of preparedness, emerging threats and...

By Enterprise CIO, 15 June 2017, 0 comments. Categories: CIO, Identity, Security.

No matter who you are – automating access governance solves a plethora of business problems

You think your organisation’s systems are secure. Your employees have the solutions they need to maintain security, and for them to do their jobs effectively. Your user accounts are being provisioned automatically and you provide self-service, so anyone who is locked out, for example, can immediately get back into their workstations and perform at the highest level. Your newly hired employees can quickly get started from moment one without delay, right, with proper access to the organisation’s...

By Dean Wiech, 02 May 2017, 0 comments. Categories: Employee Education, Employees, Identity.

Biometrics, the CIO’s challenge and how AI could finally improve mobile security

This publication once asked the question: is 2013 going to be the year of biometric security? While clearly something of an optimistic prediction, the past few years have been spent periodically lamenting the death throes of the traditional password, with seemingly minimal change.

But could we – finally – get the change the industry so desperately needs? Kevin Gilroy, executive vice president and head of Samsung Business, writes that...

By James Bourne, 31 March 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Identity, Security.

It’s time to re-energise IT – and make the IT department more than a M*A*S*H unit

(c)iStock.com/BrianAJackson

There’s no holding back the obvious truths in the land of IT. Helpdesks are inundated and overwhelmed; we are overworked and our teams are scrambling for some lucidity. The problem is simple, and most of us know: mundane, repeated and wearisome tasks that can, or probably should, be automated.

Much stress and time could be saved for our IT team’s employees by taking away some of these entanglements, but many organisations overlook doing so in the name of convenience...

By Dean Wiech, 07 February 2017, 0 comments. Categories: Employees, Identity, Security.

MobileIron introduces SSO for native apps to cure ‘app to cloud security’ gap

(c)iStock.com/ymgerman

Enterprise mobility management (EMM) software provider MobileIron has announced single sign-on (SSO) capability for its Access platform, which enables users to only input their passwords once across different applications.

“Enterprises embracing mobile and cloud services expect the same security and single sign-on capabilities to work for their native mobile apps as with web-based accessed from a PC,” wrote Vijay Pawar, MobileIron director of product management

By James Bourne, 22 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Identity.

Two recent examples of how digital has the potential to transform healthcare

(c)iStock.com/BrianAJackson

Whether it’s through applications, devices, or the data tying it all together, it’s evident that with the right path technology can transform healthcare. Two recent examples, from third sector technology provider Eduserv and open source tech giant Red Hat respectively, have shed some light on the challenges and opportunities the industry faces from both a European and American perspective.

The former comes through a recently released executive report – the second...

By James Bourne, 14 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Identity.

Why the future of identity is up in the clouds

(c)iStock.com/roberthyrons

In the last year, the volume of CIO mandates to be “cloud first” or only adopt cloud applications going forward, has increased significantly in large enterprises. Research from IDC forecasts that by 2019 enterprises will be spending more than £100 billion annually on cloud services.

When approached in the right manner, the cloud can deliver considerable benefits to organisations. But, there are several new challenges...

By Kevin Cunningham, 13 September 2016, 1 comment. Categories: CIO, Cloud , Identity.

The four steps to ensuring BYOD doesn’t affect the network

(c)iStock.com/pixsooz

A note from enterprise network security provider Hypersocket Software argues how wearable tech and wear your own device (WYOD), as well as the Internet of Things (IoT) are further challenges on the horizon for organisations struggling to cope with a BYOD infiltration.

Lee Painter, CEO of Hypersocket, notes four ‘essential’ steps for organisations to take to ensure network security in the BYOD age. “Personal devices should pose no greater danger than company-issued...

By James Bourne, 09 September 2016, 1 comment. Categories: BYOD, Enterprise Mobility, Identity, Security.

How to ensure customer and employee satisfaction with multiple service desks

(c)iStock.com/triloks

The Service Desk Institute recently researched the phenomenon of having several service desks in one organisation. The interesting thing about this research is that it provides numerical proof of what is happening in this area.

Their research reveals that 90% of the questioned organisations have more than one service desk. This means that almost every employee has to first consider where they send their request when they need service.

This often goes well for most, but it is not uncommon...

By Wolter Smit, 02 September 2016, 0 comments. Categories: Employees, Enterprise Mobility, Identity.

VMware announces new unified endpoint management and Windows 10 support

(c)iStock.com/Michal Krakowiak

Day two of VMworld focused the conversation on VMware’s enterprise mobile arm, with the company announcing new unified endpoint management and identity management capabilities, as well as support for Windows 10.

Sanjay Poonen, who heads VMware’s end user computing segment, only had 30 minutes to play with, and as a result went through the portfolio at some speed. Unlike the ‘death by PowerPoint’ approach favoured in a lot of keynote sessions, the audience...

By James Bourne, 31 August 2016, 0 comments. Categories: Enterprise Mobility, Identity, Security.

Okta gives gloomy outlook for enterprises with legacy security systems

(c)iStock.com/maxiphoto

Almost two thirds of IT leaders expect a serious data breach to hit their companies within the next 12 months, according to the latest research from cloud identity and device management provider Okta.

The pessimistic finding, which was compiled from surveying 300 IT and security professionals, contained some other head-scratching results. There was a clear lack of consensus over whether security enables or compromises productivity and agility, with 52% saying it’s a compromise,...

By James Bourne, 22 August 2016, 1 comment. Categories: Employees, Enterprise Mobility, Identity.

Dashlane launches Spaces for mobile to separate work and personal passwords

(c)iStock.com/frenky362

Password management provider Dashlane has announced the launch of Spaces for mobile, which enables employees to separate business and personal information by using their business and personal passwords on mobile devices.

The company claims moving its Spaces product, launched last month, to mobile will be a ‘major step forward’ in helping businesses and IT manage the BYOD trend. “Companies and employees alike want to protect their credentials, and separate personal...

By James Bourne, 25 July 2016, 1 comment. Categories: Enterprise Mobility, Identity, Security.

It’s time to modernise authentication methods – or suffer the consequences

(c)iStock.com/JannHuizenga

“Even the technology that promises to unite us, divides us” – Dan Brown, Angels & Demons

The way digital enterprises connect with their customers is changing.

Consumers are demanding more trusted and personalised experiences in exchange for their personally-identifiable information (PII), while businesses are struggling to protect user privacy in light of growing global security and privacy concerns.

Traditional authentication solutions and methods were simply...

By Richard Lack, 14 July 2016, 0 comments. Categories: Employee Education, Employees, Identity, Security.

The key to unlocking Identity 3.0 – and avoiding the hell of “crap” passwords

(c)iStock.com/AnthiaCumming

Identity is almost irretrievably broken – and those who are trying to fix it are going entirely the wrong way about it.

That was the underlying theme from an entertaining talk by Paul Simmonds, CEO of the not-for-profit Global Identity Foundation at Cloud and DevOps World, which puts a focus on finding a global identity solution which is privacy enhancing and globally scalable.

Pulling no punches in the early stages – describing passwords as “really crap”...

By James Bourne, 22 June 2016, 0 comments. Categories: Data & Analytics, Data Loss, Identity, Privacy.

Hello ID: Can voice activation web single sign on work in the enterprise?

(c)iStock.com/adekvat

Hello, ID. That’s right, users want to say 'hello' to ways in which they can easily gain access and permissions, and manage credentials to needed systems.

For system administrators, of course, access management and identity governance solutions, on their own, allow organisational leaders to easily support access rights and to greet the particulars of their organisations; for example, which users have access to what, when and why. But instead of being able to take a quick peek into...

By Robert Doswell, 17 May 2016, 0 comments. Categories: Employees, Enterprise Mobility, Identity.

Okta and Box team up for identity and security on Box for EMM

(c)iStock.com/PeopleImages

Identity and mobility management provider Okta has announced a partnership with Box to offer access to the cloud storage firm’s EMM product while shoring up employee security and data from every endpoint.

The resulting product, entitled Okta and Box for EMM, will enable IT departments to create policies defining how employees can access enterprise resources, as well as helping workers to access their files regardless of where they are using Box.

The move makes sense from a...

By James Bourne, 17 March 2016, 0 comments. Categories: Cloud , Enterprise Mobility, Identity.

Updating your information security strategy: Three tips for CISOs

(c)iStock.com/Pamela Moore

By Eric Hanselman, chief analyst, 451 Research

A new year means time for reflection for many, and thoughtful CISOs have a lot to consider. They’ve been through a lot recently, with increasing DDoS attacks and the quickening drumbeat of breach announcements.

But this is a time to consider more strategic approaches to delivering information security value. It’s critical to make changes that will enable an enhanced security posture in 2016. The IT landscape is changing, and...

By SafeNet, 18 February 2016, 0 comments. Categories: Enterprise Mobility, Identity, Security.