Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » identity (ID) management

Articles Tagged with ''identity (ID) management''

identity management freepik

Moving from ‘working at from home’ to a hybrid work experience

Nelson Cicchitto
Nelson Cicchitto
March 11, 2021
Identity management has become a focal point for enterprise security. With the 2020 COVID-19 pandemic and the scramble to support work-from-home employees, the real threat to business data assets, whether in the enterprise or the cloud, has become unsecured remote access.
Read More
Identity governance initiatives at your enterprise

Three reasons why identity governance projects fail

John Milburn
February 26, 2021

With 94% of organizations reporting an identity-related breach at some point, getting a solid Identity Governance and Administration initiative off the ground and scaling it is no longer a nice-to-have, but a need-to-have. 


Read More
get more out of your access control system

Get more out of your access control

Jonathan Lach
Jonathan Lach
December 29, 2020
Enterprises can increase the value of their access control by using these electronic security systems for more than just managing access at the front door.
Read More
SEC0820-Data-Feat-slide1_900px.jpg

Three key customer IAM trends for 2021

Looking ahead to 2021, the pandemic will continue to drive business interactions with consumers online. Customer identity and access management (CIAM) products should see explosive growth as these technologies will be essential for securing digital storefronts and providing enhanced experiences.
Prabath Siriwardena
December 17, 2020
The future of business has changed drastically due to the rapid advancement of the remote work era from the pandemic. Here are three key CIAM market trends that security professionals should be aware of as they finalize their 2021 plans.
Read More
Gym NRG Labs implements virtual tailgating technology for COVID-19 response

Gym company NRG Labs implements virtual technology to help with tailgating and COVID-19 response

October 30, 2020
Massachusetts-based NRG Lab, which owns and operates three gyms in the state, need a solution to tackle "tailgating" so unauthorized visitors don't enter immediately behind authorized members, as well as to ensure continued safe operation, protecting its bottom line during the heath crisis.
Read More
Time and attendance COVID-19 evolution

How the global pandemic is changing time and attendance solutions

Stephen Sardi
Stephen Sardi
October 19, 2020

Organizations have placed a priority on searching for technology solutions to help curb the spread of viruses and microbes. From doors to sinks to elevators, technologies will be centered on delivering a touchless experience; and not temporarily either. What is happening with time and attendance technology and what technologies will lead the wave in this evolution?


Read More
75% americans support facial recognition technology at airports

Independent poll says 68% of Americans support facial recognition

October 7, 2020

Independent polling firm Schoen Cooperman Research recently conducted a nationwide poll on Americans’ views of facial recognition technology. The survey of 1,000 adults found that most Americans support the use of facial recognition across a wide range of applications with 75% supporting facial recognition technology at airports.


Read More
The 'People' Part of Enterprise Cybersecurity Strategies

20% of workers don’t follow company security policies all the time

August 5, 2020
IT personnel burn a full month of work (21 days) managing Identity and Access Management (IAM) each year on mundane tasks such as resetting passwords and tracking app usage, according to a new survey from 1Password.
Read More
Doorway to Cybersecurity

Compromised employee accounts led to most expensive data breaches over past year

July 29, 2020
The results of a global study examining the financial impact of data breaches reveals that the incidents cost companies $3.86 million per breach on average, and that compromised employee accounts were the most expensive root cause.
Read More
Ask the Five Ws to Enhance Your Physical Identity and Access Management Program - Security Magazine

Why identity and access management is critical to securing a remote workforce

July 1, 2020

Identity and access management (IAM) protects the business while keeping employees securely connected, but were organizations prepared for their employees to work from anywhere? LastPass ran a study with IT decision makers, in partnership with IDG, to discover the impacts of remote work to IAM and found that IAM is critical to securing a remote workforce, but almost all organizations have had to adjust their IAM strategy to securely enable employees to work from anywhere.


Read More
Previous 1 2 … 7 8 9 10 11 12 13 14 15 … 24 25 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing