News

Ping Ushers in a New Era of Identity for Sun IAM Customers

Oracle's purchase of Sun Microsystems in 2010 was really the beginning of the end for Sun's Identity and Access Management suite. 2014 is the last year that Sun OpenSSO, Sun Identity Manager, and Sun Directory Server EE will be supported by Oracle. Although time has nearly run out for customers still using these products, Ping Identity can help organizations make the transition to a new era of identity management.

Read more...

2014: the Year of Corporate Data Accountability

Companies are increasingly falling victim to cyber-attacks which are more frequent and devastating than ever before.

Organisations are finally recognising data are their most important asset, and there has been a significant shift in the search for IT solutions to combat this growing security threat.

The International Data Corporation (IDC) is the premier global advisor on corporate data security, advising IT companies on the best technology purchases and strategies to safeguard their businesses from cyber-attacks.

Read more...

What Toy Story Taught Us About Corporate Data Protection

It is a lesson found in a Hollywood script; in 2008, one erroneous command button was executed, deleting 90% of the Pixar film Toy Story 2, costing the company millions.   

Oren Jacob, former Chief Technical Officer of Pixar, took the responsibility for the error that erased two months and hundreds of man-hours worth of work in one foul swoop.  After the embarrassing incident, Jacob concluded that the loss of data could have easily been avoided through two measures: firstly, Pixar needed better security software in place.  And secondly, employees needed to be properly trained on it to identify and avoid potential risks.

Read more...

5 New Truths To Teach Your CIO About Identity

 

When CIOs talk security they often use words like "firewall" and "antivirus." Here's why today's technology landscape needs a different vocabulary.

 

Modern businesses are more open than ever before, but that doesn’t mean they are more secure. On the business side, companies are taking advantage of cloud computing by focusing on their internal competencies and outsourcing what they can to third-party vendors. On the consumer side, employees armed with devices are increasingly demanding flexible and frictionless access to data from anywhere.

Read more...

Never Forgotten: Protecting Your Business from Former Employees

13% of IT Staff can still access previous employers' systems

New research by our partner Lieberman Software shows that more than 13% of IT professionals can still access their previous employers' systems by utilising old security credentials that were never revoked.

When asked about contractor access to IT systems, 20% of respondents mentioned that there was no policy in place to prevent contractor access to these systems after they leave.   

Philip Lieberman, CEO of Lieberman Software has this advice for companies:

  1. Change all passwords
  2. Check all accounts
  3. Use a privilege management system for contractors & employees

Read the full article

 

Why privileged account management is hard to scale

Why is privileged account management hard to scale?

Most companies do a better job of managing user accounts and their credentials than they do of managing the elevated privileges often shared among administrators within an organisation. 

Read more...

IDC MarketScape Names Ping Identity a Leader in Federated Identity Management and Single Sign-On

DENVER--(BUSINESS WIRE)--Ping Identity®, The Identity Security Company™, has been named a leader in IDC’s, “IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On Vendor Assessment” report. Ping Identity was among the highest positioned vendors in the federated identity management (FIM) single sign-on (SSO) market.

Read the full article: http://www.businesswire.com/news/home/20140404005708/en/IDC-MarketScape-Names-Ping-Identity-Leader-Federated#.Uz76XK1dVUM

Webinar: Future Proof Your Architecture

May 8th 10am PDT

Learn what a modern architecture looks like. It accepts any identity, authenticates users, and asserts those identities to any cloud, mobile, web, or network resource without requiring directory migration or duplication.  
Learn from security experts at Deloitte how you can rethink your architecture with a fresh outlook that meets the needs of your agile enterprise.
 

Presented by:

Treb Farrales, CISSP/PMP
Senior Manager
Deloitte & Touche, LLP

Garret Grajek
CTO and Technical Founder
SecureAuth Corporation

Register for more details

 

Privileged Identity Management Sector Heats Up In Europe

Lieberman Software Announces New Offices and Partners to Accommodate Growing Demand

(LOS ANGELES, CA – April 23, 2014) Lieberman Software Corporation today announced significant expansion into the European market. The company is recruiting new strategic partners in the EMEA region due to the increasing number of enterprises striving to close data security holes, meet regulatory compliance mandates and reduce cyber security risk through privileged identity management software. 

As part of its expansion, Lieberman Software recently established regional offices in the UK, Netherlands and Germany. The company has already developed new partnerships this year with leading distributors and value-added resellers including Exclusive Networks, IT2Trust, Consist Software, Web Control and ZeroDayLab. 

Calum MacLeod, VP of EMEA at Lieberman Software, said: “The nature of attacks against IT infrastructures is evolving at an alarming rate. Conventional security products are, in many cases, no longer effective against the sophisticated, state-sponsored attacks that both government and private sector industries are experiencing. At Lieberman Software we are helping large enterprises protect their powerful privileged accounts against unauthorized and anonymous access. As part of our expansion in EMEA we are taking on new partners to assist with the need from enterprises to secure their privileged identities against advanced cyber attacks.”

About Enterprise Random Password Manager 
According to Verizon’s 2013 Data Breach Investigations Report, 76% of network intrusions are caused by exploited weak or stolen credentials.1 Lieberman Software’s Enterprise Random Password Manager (ERPM) helps mitigate this risk by allowing organizations to ensure that powerful privileged accounts are only available to authorized users on an as-required, “need-to-know” basis. ERPM increases both operational efficiency and overall IT security posture by managing privileged user and service accounts, preventing unauthorized users and programs from accessing systems with critical data. 

ERPM continues to earn global recognition and was recently named the “Innovation Leader” and the market share leader in the USA, according to the KuppingerCole Leadership Compass on Privilege Management. ERPM also won the 2013 Security Product of the Year Award from TechWorld.

Paul Brereton, Technical Director of ZeroDayLab, said: “With Lieberman Software our customers benefit from technology that automates the privileged identity management lifecycle throughout the cross-platform enterprise. This is crucial for large and dynamic environments that are particularly susceptible to cyber-attacks. Lieberman Software is the only privileged identity management vendor that provides end-to-end automation, as well as continuous discovery of privileged accounts.”

1Verizon, “2013 Data Breach Investigations Report",2013.

Two IDM solutions from EB2BCOM feature highly in The Forrester Wave™: Identity and Access Management Suites, Q3 2013 Report

EB2BCOM is excited to announce that two of our leading IDM solutions have been recognised in Forrester Research Inc.’s, “The Forrester Wave™: Identity and Access Management Suites, Q3 2013″ report. Our two solutions feature in the top nine most significant vendors in the IAM suite category.

Read more...

Additional information