Strong Authentication has become an issue of "risk management." Traditionally, authentication has been a binary problem with a binary answer -- you are or are not authenticated. But recent "guidance" ...
In this episode of eSpeaks, Jennifer Margles, Director of Product Management at BMC Software, discusses the transition from traditional job scheduling to the era of the autonomous enterprise. eSpeaks’ ...
The shift to remote work has transformed how organizations manage access to their digital resources. Identity Access ...
Descope has launched its first product, a platform designed to help developers add authentication and user management capabilities to their business-to-consumer and business-to-business applications.
The key to identity management lies beyond the keychain. (Turk_stock_photographer/Getty Images) Identity and access management sounds simple. As defined by Gartner, it means that “the right ...
Compare the top 5 customer identity and access management (CIAM) platforms in 2026 to find the right fit for your product's authentication needs.
Article 9 of DORA makes authentication and access control a legal obligation for EU financial entities. Here is what the ...
Avast has acquired SecureKey Technologies to bolster the firm's digital authentication and identity management portfolio. The deal was announced on Thursday. Financial details have not been disclosed.
Hot off its fourth acquisition of 2017, channel-friendly cloud service provider Evolve IP said Tuesday that it is the new owner of identity authentication provider Clearlogin. The Clearlogin ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. WINNER Courion Corp.s Courion Identity Management Suite ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results