Identity Management (IM) Questions
Nov 29 2021
What is it and how can you practically use it in your organization?
Dec 02 2021
Which modern tools would you recommend using to prevent this type of attack?
Dec 01 2021
We are working with an energy and utility client based in the US.
Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc).
We integrate with a host of external vendor products such as Payment Gateway, eKYC vendors, third-party Aggregators, etc.
We are looking to explore an IAM product tool that fits well within our technology landscape.
Primarily, we would have internal employees authenticating and connecting to a host of applications from the Internet and as well as external vendors, partners also connecting to it.
Currently, we have suggested having an external Domain Controller for external users and a separate Domain Controller - for internal users. This way we can have more granular governance, access, and security policies for external and internal users.
In the future, we might expose the authentication using social media as well (such as GMAIL, LI, FB, etc) for guest users.
Please share your advice about an IAM product/solution that fits our requirements and within the Microsoft Technology stack and landscape.
Nov 29 2021
Hi security professionals,
As the majority of you have probably heard, GoDaddy has been hacked again a few days ago.
Based on what is already known, what has been done wrong and what can be done better?
Share your thoughts!(less)
Sep 29 2021
How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use?
Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?(less)
Sep 19 2021
What tools do you use to make your remote work efficient? Providing use cases along with the pros & cons of the tools would also be beneficial for the community.
Thanks for sharing your experience!
Oct 05 2021
In my opinion, it's very important for your enterprise firewall/NGFW to support ID-based rules.
What products do provide this feature? What kind of identity-based rules are supported by them?
Jul 26 2021
I am researching identity management solutions. Who in the team should be managing the IDM product?
What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?
Nov 01 2021
What tools can be used to help make GDPR compliance easier? What are some specific features to look out for?
Oct 14 2021
Can you share your recommendations for the most efficient way to handle the employee identity lifecycle in a secure way?
Also, any suggestions for the tools to put in place to ease this process?
Why Identity governance and administration are considered so important in enterprise IT management?
How can Identity Management (IM) tools help manage IGA better?
Product CategoriesIdentity Management (IM)
Download our free Identity Management (IM) Report and find out what your peers are saying about Nexus Group, ForgeRock, Omada, and more!
- Looking for an Identity and Access Management product for an energy and utility organization
- Who should manage the Identity Management product?
- What access management tools would you recommend to help with GDPR compliance?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
- Why is identity and access management (IAM) so important in preventing data breaches?
- What are the best practices to prevent a Brute Force attack via remote access?
- What are some tips for managing the identity lifecycle securely and effectively?
- Why is Identity Governance and Administration (IGA) important?
- What firewalls do support identity-based rules?
- What tools do you use to make a remote work more efficient?