Video: Top Resources for Comparing Identity Management Tools
Identity management is a fundamental part of organizational information security, yet too many businesses still rely on username and password combinations, the simplest, oldest form of authentication, to do the job.
But times are changing, and as traditional methods prove dangerously insecure many organizations are looking to modernize their Identity and access management (IAM) solutions and practices. In order to do that, IT workers, CIOs, and CISOs need to conduct extensive research to correctly plan, assess, and deploy the right solution for their organization.
So where should you start? In this video, we list the top 10 resources for evaluating—and comparing—Identity Management tools.
Check out the list with full descriptions (and resource links) here.
This article was written by Jeff Edwards on September 9, 2016
Jeff Edwards
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
- 17 Cybersecurity Podcasts You Should Listen to in 2020 - January 3, 2019
- What’s Changed: Gartner 2017 Magic Quadrant for Identity Governance and Administration (IGA) - January 28, 2018
- Crossmatch Integrates Keyboard Capture to Identity Management Software - November 27, 2017