05.22.2018 - Protecting Your Patient’s PHI Data

For healthcare, there’s never been a more urgent time to reassess your cybersecurity and identity and access management strategy. Until recently, protected health information (PHI) was the most valuable merchandise on the Dark Web. Complete healthcare records were going for $75 to $100 dollars at the height of demand according to Institute for Critical Infrastructure Technology (ICIT).  ...

05.2.2018 - Know Your Credentials: The Other KYC Requirement

The way people want to interact with their financial providers has changed quickly in the past few years. Now, account holders want control over their funds, and they don’t want to jump through hoops to exert that control. They expect a streamlined customer experience that lets them accomplish their tasks quickly, and there are great rewards to be reaped by institutions able to meet those expectations. For example, according to PwC’s 2017 Digital Banking Consumer Survey, 46 percent of consumers do all their banking online, a percentage that will grow even larger as the first generation of digital natives—those graduating high school around now—enter their adult lives and establish relationships with banks and investment firms. A delightful customer experience isn’t the only purpose of good identity and access management. Financial firms need to meet Know-Your-Customer (KYC) requirements from many regulatory bodies in order to avoid hefty fines. These institutions may assume that meeting KYC and other regulatory requirements means their sensitive data is safe ¾ but that would be a mistake. Hackers aren’t the only threat to Personally Identifiable Information (PII) and other sensitive data. A financial organization’s own employees can present a danger as well. Insider threats take many forms. In rare cases, the employee is a thief who has actively sought access to parts of a core system they have no business accessing. In some cases, the employee is an opportunist who borrowed someone else’s credentials for legitimate reasons and then stumbled onto a trove of data that was too tempting to leave alone. But far more often, the employee is an unwitting pawn who’s fallen for a phishing scam or been socially engineered into sharing credentials with a con artist. Yet regardless of an intruder’s motivation or means, the results for the employer are the same: data leakage, brand damage, and regulatory penalties. ...

03.31.2018 - Password Security – MFA and Agentless SSO Explained: Cyber Defense Magazine

Author: Mark Foust, Director of Worldwide Technical Sales for Optimal IdM Multifactor authentication is the undisputed wave of the future when it comes to identity authentication and access management. But, what does multifactor authentication entail and why use agentless SSO? Here we break down the basics of SSO and various MFA options. Read more >> ...

03.6.2018 - The Barriers to Entry for Blockchain

In part one of our Identity Blockchain blog series, we discussed the fundamentals of blockchain and why establishing trust is a key factor making it work. But beyond the obvious Bitcoin application of the blockchain network, there are a number of blockchain experimental infrastructures already in trial (proof of concepts) by corporations and consortiums. If there’s a ‘market’ for those technologies, they will spin off from central governing bodies and spawn new peers. There are, of course, barriers to widescale blockchain adoption. ...

02.20.2018 - Integrate Your Mobile Applications Into Your Company

When it comes to integrating your mobile applications into your company’s backend, you need a secure authentication and authorization process that’s not only efficient, but also reliable, easy-to-use and supportive of cloud-based access. Learn more about implementing a safe integration of your mobile applications below. ...

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.

Pin It on Pinterest