Top 13 Solutions Review Identity Management Articles and Best Practices

Top 13 Solutions Review Identity Management Articles and Best Practices

The editors of Solutions Review work to research identity management, and cybersecurity in general, on a constant basis. We compile technology research papers and reports, product updates, and capability trends. Then, we compile it into best practices articles posted every week (and multiple times a week at that). 

Obviously, we offer a lot of identity management articles and best practices. Sorting through all of them could feel daunting to the IT decision-maker. Thus, we compiled some of our best identity management articles and best practices for your perusal. Check it out here! 

A Compendium of Identity Management Articles and Best Practices 

1. The 16 Best Identity Governance Tools for 2020

The 16 Best Identity Governance Tools for 2020

Solutions Review’s listing of the best identity governance tools and software is an annual sneak peek of the solution providers included in our Buyer’s Guide and Solutions Directory. Information was gathered via online materials and reports, conversations with vendor representatives, and examinations of product demonstrations and free trials. Check out which vendors made the list here

2. The Top Identity & Access Management (IAM) Books You Should Be Reading

The Top Identity & Access Management (IAM) Books You Should Be Reading

There are loads of free identity management resources available online (such as Solutions Review’s best practices articles, solutions directories, and buyer’s guides), and those resources are great, but sometimes it’s best to do things the old-fashioned way. Besides, there are few resources that can match the in-depth, comprehensive detail of good IAM books. We compiled a shortlist of the top introductory IAM books here.

3. The 5 Best Biometric Authentication Tools for Enterprises

The 5 Best Biometric Authentication Tools for Enterprises

The editors at Solutions Review have developed this resource to assist buyers in search of the best biometric authentication tools to fit the needs of their organization. Choosing the right vendor and solution can be a complicated process — one that requires in-depth research and often comes down to more than just the solution and its technical capabilities. To make your search a little easier, we’ve profiled the best biometric authentication tools providers all in one place. Check out the list here

4. The 10 Best Cybersecurity TED Talks For Practitioners

The 10 Best Cybersecurity TED Talks For Practitioners

The editors at Solutions Review curated this list of the best Cybersecurity TED talks for practitioners. For expert lecturers and speakers in innumerable verticals, TED Talks offer a unique and influential video platform. Solutions Review’s editors curated this list of cybersecurity TED Talks to watch for practitioners; we selected these talks based on their relevance, ability to add business value, and individual speaker expertise. Check it out here

5. The 10 Best Enterprise Privileged Access Management Tools for 2020

The 10 Best Enterprise Privileged Access Management Tools for 2020

Another critical list for this compendium of identity management and best practices, we present the 10 best enterprise privileged access management tools. We profiled the vendors and their tools in detail; we gathered information via online materials and reports, conversations with vendor representatives, and examinations of product demonstrations and free trials. Check it out here

6. The 30 Best Identity Management Companies For 2020

The 30 Best Identity Management Companies For 2020

Enterprise cybersecurity must build its foundation on identity and access management. In fact, experts contend that identity looks poised to subsume the entirety of business cybersecurity within the next few years. Also, IAM already constitutes the digital perimeter through authentication capabilities. That’s why our editors have compiled this list of the 30 best identity management companies for 2020. Learn more here

7. The 7 Best LinkedIn Identity Management Groups You Should Join

The 7 Best LinkedIn Identity Management Groups You Should Join

You can find cybersecurity insights, especially for Identity Management in the LinkedIn Groups. LinkedIn professional groups allow experts in niche fields and branches to discuss their latest findings and share resources. In that spirit, the editors at Solutions Review present our list of the 7 best LinkedIn Identity Management groups you should join. Take a look here

8. What’s Changed: 2019 Gartner Magic Quadrant for Identity Governance and Administration (IGA)

What’s Changed: 2019 Gartner Magic Quadrant for Identity Governance and Administration (IGA)

We can’t list identity management articles and best practices without discussing Gartner. Here, we analyze the 2019 Gartner Magic Quadrant for Identity Governance and Administration (IGA). This is the seventh iteration of the report; In this Magic Quadrant report, Gartner evaluates the strengths and weaknesses of eleven providers it considers most significant in the marketplace and provides readers with a graph (the eponymous Magic Quadrant). Read our analysis here

9. What’s Changed: the 2019 Gartner Magic Quadrant for Access Management

What’s Changed: the 2019 Gartner Magic Quadrant for Access Management

On the other side, we perform a similar analysis on the 2019 Gartner Magic Quadrant for Access Management (AM). Read it here

10. The 5 Key Privileged Identity Management Capabilities

The 5 Key Privileged Identity Management Capabilities

What are the five key privileged identity management capabilities necessary for modern enterprises? How can they improve both your cybersecurity and your workflows? We answer these questions and more in this in-depth article. Take a look here

11. 7 Critical Identity Management Questions Your Enterprise Needs to Ask

7 Critical Identity Management Questions Your Enterprise Needs to Ask

What are the 7 critical identity management questions your enterprise needs to ask itself? Where can you go to find the answers to these questions? Also, how should these questions influence or direct your identity security solution search? We answer these questions and the critical identity management questions in this article. Check it out here

12. The 10 Best Free and Open Source Identity Management Tools

The 10 Best Free and Open Source Identity Management Tools

Your business needs a strong IAM solution, we hope these identity management articles emphasize that. However, small-to-medium businesses may find selecting a full-fledged IAM solution too costly in time and resources. Additionally, enterprises still seeking a solution can benefit from a free identity security tool. Thus we’ve compiled a list of the 10 best free and open source identity management tools available for businesses. See them here

13. 17 Cybersecurity Podcasts You Should Listen to in 2020

17 Cybersecurity Podcasts You Should Listen to in 2020

For those in the know, or those who need to know, cybersecurity podcasts can be a great resource for the expert and the amateur alike. Experts from around the world, from outside observers to solution provider researchers have adopted cybersecurity podcasts as a platform for helping enterprises secure their IT environments. Check out our picks here

How to Learn More 

You can check out our identity management articles and best practices here. Also, download our IAM Buyer’s Guide for more on solution providers and key capabilities.

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner