Tag: Identity and Access Management (IAM)

People Access: The Weakest Link in Security

In this era of mobile, cloud and social, have you done enough to secure access to your most critical business resources? Security is as strong as its weakest link, and the weakest link these days is people, your users who access your business...

Discovering Threat-Aware Identity and Access Management

IBM Pulse Protect 2014 will introduce “the new face of IAM," IBM Security Identity and Access Management solutions redesigned to help deliver access services safely, efficiently and cost-effectively to internal and external users within security...

Is the Internet Killing Knowledge Based Authentication?

Something only the user knows. Most of us have encountered Knowledge Based Authentication (KBA), though we might not have realized it had a name. Think back to a time when you phoned your mortgage or credit card company to discuss your account. They...