Top
5 tools for improved identity management

5 tools for improved identity management

March 9, 2015

Via: itCurated
Category:

The use of identity-centric security to protect government IT systems has become increasingly urgent as high profile attacks continue to pierce government  systems.  In fact, besides traditional forms of perimeter-based security, identity management is seen by some as offering the best case for protection in expanding cloud and mobile environments.

While these challenges unfold, government agencies will have to rely on improving existing technology solutions – like those highlighted below – to help manage their ongoing and embryonic security threats.  The programs and products represent some of the more far-thinking attempts to address the pressing identity issues and the resulting security concerns associated with weak passwords, the proliferation of mobile devices connecting to networks and the dangers posed by employee data handling errors and theft.

Read More