Author Archives: Ginny Turley

About Ginny Turley

Ginny Turley is a seasoned Marketing professional with experience in product management, product marketing and brand management. She works hard to communicate and inform the market and thrives on delighting customers while exceeding expectations.

Join us in our webcast on Complex Application Security Requirements

Comments Off on Join us in our webcast on Complex Application Security Requirements

 

Closing Pandora’s Box: Complex Application Security Requirements, Simplified Application Security Solutions

Join our webcast live online Nov 12, 2015

How to close the gap between password management, identity access management and application based policies to control all access

closing pandora's box

application security

Once a user has been granted the permissions to access data and applications, how can we close the loopholes that may allow the user to access data in an inappropriate manner or ignore policy?

Using today’s ABAC (Attribute Based Access Control) standards, you can programmatically and systematically close the lid to Pandora’s box and ensure accesses are only occurring where and when they should by an authorized user.

Tags: |

Network Security’s weakest Link: Password Management

Posted by · filed under Events, Password Management
Comments Off on Network Security’s weakest Link: Password Management

Join our webcast live online Sep 22, 2015:

Password Management
Password Management

While network security encompasses both the physical and software preventative measures to prevent and monitor unauthorized accesses or misuse of a computer network, the adoption of a password management policy and strategy can be foundational to the prevention of unauthorized uses of network resources. In many cases, simple password management is the weakest link.

Tags:

Insider threats – how to fight the vulnerabilities coming from within the company

Posted by · filed under Identity Access Management
Comments Off on Insider threats – how to fight the vulnerabilities coming from within the company

Insider threats – how to fight the vulnerabilities coming from within the company

Insider Threats

Insider Threats

Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strenghten the protection of data.

Using the need “need to know” principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This webcast session will focus on how to adjust data access rights, implementing the “least privilege principal”, and the use of detective and proactive risk-oriented controls.

Join our 45 min webcast on insider threats on July 28, 2015 at and register here:
Webcast Insider Threats 

Tags: | |

How to avoid IAM pitfalls

Comments Off on How to avoid IAM pitfalls

9 pitfalls to avoid when implementing an IAM solution

Chances are, your organization already has a plan and a collection of solutions for the complex issues surrounding Identity Access Management and Governance (IAM). But the real trick is figuring out how to avoid IAM pitfalls that have challenged even the most talented organizations in the implementation process. Here are the 9 major IAM pitfalls to avoid:

Tags: |