The editors of Solutions Review work to research identity management, and cybersecurity in general, on a constant basis. We compile technology research papers and reports, product updates, and capability trends. Then, we compile it into best practices articles posted every week (and multiple times a week at that).
Obviously, we offer a lot of identity management articles and best practices. Sorting through all of them could feel daunting to the IT decision-maker. Thus, we compiled some of our best identity management articles and best practices for your perusal. Check it out here!
A Compendium of Identity Management Articles and Best Practices
1. The 16 Best Identity Governance Tools for 2020
Solutions Review’s listing of the best identity governance tools and software is an annual sneak peek of the solution providers included in our Buyer’s Guide and Solutions Directory. Information was gathered via online materials and reports, conversations with vendor representatives, and examinations of product demonstrations and free trials. Check out which vendors made the list here.
2. The Top Identity & Access Management (IAM) Books You Should Be Reading
There are loads of free identity management resources available online (such as Solutions Review’s best practices articles, solutions directories, and buyer’s guides), and those resources are great, but sometimes it’s best to do things the old-fashioned way. Besides, there are few resources that can match the in-depth, comprehensive detail of good IAM books. We compiled a shortlist of the top introductory IAM books here.
3. The 5 Best Biometric Authentication Tools for Enterprises
The editors at Solutions Review have developed this resource to assist buyers in search of the best biometric authentication tools to fit the needs of their organization. Choosing the right vendor and solution can be a complicated process — one that requires in-depth research and often comes down to more than just the solution and its technical capabilities. To make your search a little easier, we’ve profiled the best biometric authentication tools providers all in one place. Check out the list here.
4. The 10 Best Cybersecurity TED Talks For Practitioners
The editors at Solutions Review curated this list of the best Cybersecurity TED talks for practitioners. For expert lecturers and speakers in innumerable verticals, TED Talks offer a unique and influential video platform. Solutions Review’s editors curated this list of cybersecurity TED Talks to watch for practitioners; we selected these talks based on their relevance, ability to add business value, and individual speaker expertise. Check it out here.
5. The 10 Best Enterprise Privileged Access Management Tools for 2020
Another critical list for this compendium of identity management and best practices, we present the 10 best enterprise privileged access management tools. We profiled the vendors and their tools in detail; we gathered information via online materials and reports, conversations with vendor representatives, and examinations of product demonstrations and free trials. Check it out here.
6. The 30 Best Identity Management Companies For 2020
Enterprise cybersecurity must build its foundation on identity and access management. In fact, experts contend that identity looks poised to subsume the entirety of business cybersecurity within the next few years. Also, IAM already constitutes the digital perimeter through authentication capabilities. That’s why our editors have compiled this list of the 30 best identity management companies for 2020. Learn more here.
7. The 7 Best LinkedIn Identity Management Groups You Should Join
You can find cybersecurity insights, especially for Identity Management in the LinkedIn Groups. LinkedIn professional groups allow experts in niche fields and branches to discuss their latest findings and share resources. In that spirit, the editors at Solutions Review present our list of the 7 best LinkedIn Identity Management groups you should join. Take a look here.
8. What’s Changed: 2019 Gartner Magic Quadrant for Identity Governance and Administration (IGA)
We can’t list identity management articles and best practices without discussing Gartner. Here, we analyze the 2019 Gartner Magic Quadrant for Identity Governance and Administration (IGA). This is the seventh iteration of the report; In this Magic Quadrant report, Gartner evaluates the strengths and weaknesses of eleven providers it considers most significant in the marketplace and provides readers with a graph (the eponymous Magic Quadrant). Read our analysis here.
9. What’s Changed: the 2019 Gartner Magic Quadrant for Access Management
On the other side, we perform a similar analysis on the 2019 Gartner Magic Quadrant for Access Management (AM). Read it here.
10. The 5 Key Privileged Identity Management Capabilities
What are the five key privileged identity management capabilities necessary for modern enterprises? How can they improve both your cybersecurity and your workflows? We answer these questions and more in this in-depth article. Take a look here.
11. 7 Critical Identity Management Questions Your Enterprise Needs to Ask
What are the 7 critical identity management questions your enterprise needs to ask itself? Where can you go to find the answers to these questions? Also, how should these questions influence or direct your identity security solution search? We answer these questions and the critical identity management questions in this article. Check it out here.
12. The 10 Best Free and Open Source Identity Management Tools
Your business needs a strong IAM solution, we hope these identity management articles emphasize that. However, small-to-medium businesses may find selecting a full-fledged IAM solution too costly in time and resources. Additionally, enterprises still seeking a solution can benefit from a free identity security tool. Thus we’ve compiled a list of the 10 best free and open source identity management tools available for businesses. See them here.
13. 17 Cybersecurity Podcasts You Should Listen to in 2020
For those in the know, or those who need to know, cybersecurity podcasts can be a great resource for the expert and the amateur alike. Experts from around the world, from outside observers to solution provider researchers have adopted cybersecurity podcasts as a platform for helping enterprises secure their IT environments. Check out our picks here.
How to Learn More
Latest posts by Ben Canner (see all)
- How Identity Management Interacts with Human Resources (HR) - July 14, 2020
- 2020 Vendors to Know: Identity Management - July 13, 2020
- 2020 Vendors to Know: Identity Governance - July 9, 2020