The 15 Top Identity Management Articles of 2020

The 15 Top Identity Management Articles of 2020

The editors of Solutions Review work to research identity management on a constant basis. We compile technology research papers and reports, product updates, and capability trends. Then, we compile it into best practices articles posted every week. Therefore, we tend to post a lot of identity management articles through 2020 and beyond. Sorting through all of them could feel daunting to the IT decision-maker. Thus, we compiled some of our top identity management articles and best practices released in 2020 to simplify the research process. 

The 15 Top Identity Management Articles of 2020

The 7 Best LinkedIn Identity Management Groups You Should Join

LinkedIn serves as one of the premier platforms for enterprise technology professionals to gather, share ideas, and connect. IT security professionals and decision-makers alike seeking insights from the smartest in the industry can find it at LinkedIn. Specifically, you can find these cybersecurity insights, especially for Identity Management in the LinkedIn Groups. LinkedIn professional groups allow experts in niche fields and branches to discuss their latest findings and share resources. In that spirit, the editors at Solutions Review present our list of the 7 best LinkedIn Identity Management groups you should join. These are the most active forums on LinkedIn, and they regularly help us keep tabs on the industry.

Read the Article Here

The 30 Best Identity Management Companies For 2020

Solutions Review’s listing of the top Identity Management vendors is an annual mashup of products that best represent current market conditions, according to the crowd. Our editors selected the top Identity Management products based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites, and our own proprietary five-point inclusion criteria.

Read the Article Here

The 10 Best Enterprise Privileged Access Management Tools for 2020

The editors at Solutions Review have developed this resource to assist buyers in search of the best-privileged access management tools to fit the needs of their organization. Choosing the right vendor and solution can be a complicated process — one that requires in-depth research and often comes down to more than just the solution and its technical capabilities. To make your search a little easier, we’ve profiled the best-privileged access management tools providers all in one place.

Read the Article Here.  

The 10 Best Cybersecurity TED Talks For Practitioners

The editors at Solutions Review curated this list of the best Cybersecurity TED talks for practitioners. For expert lecturers and speakers in innumerable verticals, TED Talks offer a unique and influential video platform. TED began in 1984 as a conference uniting the Technology, Entertainment, and Design fields; today, TED Talks explores almost all topics ranging from business to technology, from global issues to art in over 110 languages. Therefore, the TED website represents a growing library of free knowledge from the world’s top thinkers.  

Read the Article Here

The 5 Best Biometric Authentication Tools for Enterprises

Solutions Review’s listing of the top Biometric Authentication vendors is an annual mashup of products that best represent current market conditions, according to the crowd. Our editors selected the top Biometric Authentication products based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites, and our own proprietary five-point inclusion criteria.

Read the Article Here. 

The Top Identity & Access Management (IAM) Books You Should Be Reading

Identity and access management (IAM) is an essential component of any enterprise’s security kit—according to some experts, perhaps the most essential component. Making sure your team understands your IAM solution is another conversation. Your IT security team needs to understand how to manage new capabilities and priorities in your IAM solution in order to best understand how to protect your enterprise. There are loads of free resources available online (such as Solutions Review’s best practices articles, solutions directories, and buyer’s guides), and those resources are great, but sometimes it’s best to do things the old-fashioned way… and there are few resources that can match the in-depth, comprehensive detail of good IAM books.

Read the Article Here.

The 16 Best Identity Governance Tools for 2020

The editors at Solutions Review have developed this resource to assist buyers in search of the best identity governance tools to fit the needs of their organization. Choosing the right vendor and solution can be a complicated process — one that requires in-depth research and often comes down to more than just the solution and its technical capabilities. To make your search a little easier, we’ve profiled the best identity governance tools all in one place. 

Read the Article Here.  

Mitigating Remote Risk in Identity Management: The Capabilities You Need

The coronavirus forces businesses of all sizes to embrace work-from-home like never before; until we can effectively and legitimately contain the virus, this represents the safest way to limit infections. Additionally, work-from-home policies (if implemented properly) can actually boost productivity and worker engagement. However, work-from-home policies and infrastructures generate remote risk, especially for companies’ identity management solutions. What remote risks do enterprises face in the wake of the coronavirus? What identity management capabilities can help your organization mitigate these threats?

Read the Article Here

Solutions Review Presents Our IAM Video Crash Course

It remains unclear how long the United States needs to stay socially distant; best estimates put the reopening date well past May 1. Therefore, most of us shall need to stay at home. However, working from home can offer plenty of opportunities for growth and improvement. In fact, this break in normal workflows allows cybersecurity professionals to catch up on their identity and access management (IAM) skills. Alternatively, social distancing may offer your IT security team the time to gather resources and information for selecting a new identity management solution. In that spirit, Solutions Review proudly presents an IAM Video Crash Course. These videos can help you refresh your basic identity management and cybersecurity knowledge or help make strong IT decisions.

Read the Article Here

How to Make Your Passwords Stronger In the Coronavirus Era

the editors of Solutions Review presented a rather dim view of passwords as an authentication factor. In fact, we listed the charges against passwords as follows: 

  • Hackers can easily guess or crack passwords. Some use readily available tools from the Dark Web, others make educated guesses based on publicly available information like social media. In either case, hackers can easily bypass most password-only security systems. 
  • Repeated passwords can create a cascading effect of data breaches; if one data breach exposes passwords, hackers can use those passwords on other sites. Given that so many users repeat their passwords to avoid forgetting or losing them, this often causes another data exposure. 
  • Users generally do not prefer passwords because they often forget or lose them, forcing them through the tedium of password recovery. They prefer other factors once they get used to them. 

Read the Article Here.

Expert Share Password Best Practices for World Password Day, 2020

Frequently, the editors of Solutions Review express cynicism concerning passwords and password best practices. Unfortunately, passwords rarely offer businesses or users with adequate authentication security. Hackers can easily purchase cracking software from underground markets or just guess at passwords from social media feeds. Users frequently repeat passwords, which creates a security vulnerability all on its own. However, it appears passwords are here to stay; certainly almost all users recognize and can interact with passwords. Perhaps on this World Password Day, 2020, we can find the password best practices that fit with modern demands. 

Read the Article Here

Top 10 Udemy Identity Management Courses for Professionals

Solutions Review lists the top 10 identity management courses you can take on Udemy right now that every security professional should consider taking. Are you a cybersecurity professional looking to gain new knowledge in identity management or brush up on your skills? Do you want to earn an identity management certification but you don’t know how to prepare yourself for the exams? Online courses offered through websites like Udemy allow cybersecurity professionals to practice their InfoSec knowledge and sharpen their skills through digital lectures and interactive guides.

Read the Article Here.

Top 7 Cybersecurity Certification Courses from IT Governance USA  

How can you, as a cybersecurity professional, both supplement your cybersecurity knowledge and hone your skills? The answer is through cybersecurity certification. Receiving certifications can help professionals refine their threat detection and mitigation tactics while also increasing their marketability if they choose to seek out new opportunities. IT decision-makers can greatly benefit from seeking out cybersecurity certification courses for themselves or for their security operations team members. Therefore, we present you with the top seven cybersecurity certification courses provided by IT Governance USA. 

Read the Article Here

Top Ten Books for Identity Management Professionals

Identity Management now comprises the new digital perimeter for businesses. The majority of cyber-attacks begin with compromised credentials, privileged or otherwise. We’ve listed the top 10 books that identity management professionals should add to their reading lists. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the fields of identity management and cybersecurity.

Read the Article Here

Findings: 2020 Gartner Magic Quadrant for Access Management

Technology research giant Gartner, Inc. recently released the 2020 Gartner Magic Quadrant for Access Management. You can download it here. Gartner researchers define Access Management as “technologies that use access control engines (identity providers, authorization servers, policy servers, etc.)” This includes capabilities such as authorization and adaptive access, user self-service capabilities including registration and password management, and session management. 

Read the Article Here.

How to Learn More 

Thank you for reading our top Identity Management articles of 2020. You can check out our endpoint security best practices here. Also, download our Free Identity Management Buyer’s Guide for more on our solution providers and key capabilities.

Keep up with the latest identity management articles of 2020 and 2021 on social media.

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner