Identity and Access Mgmt

CyberCyte

ITSPmagazine-CompanyDirectory-cybercyte.jpg
 
               
 

CyberCyte solutions converge IT, OT, IOT and Biometrics to provide visibility, control and the highest levels of situational and contextual security across your entire Infrastructure. As the world becomes hyper connected the growth of devices, data and use of AI is driving Global Digital Disruption, the social and economic realities cannot be ignored as entire industries have been disrupted.

Organisations, industries and Governments are more than ever looking at data, real time information and situational intelligence as critical assets to drive competitive advantage. Your digital transformation strategy should bridge humans, information, IT, OT, IOT and processes both internally and externally. CyberCyte provide solutions to enable this.

Let the transformation begin.


  Where Can You Find CyberCyte?

Need to register for the event? No problem, you can  do that here .  https://itspm.ag/2wif9n6

Need to register for the event? No problem, you can do that here.
https://itspm.ag/2wif9n6

  Latest News and Updates from CyberCyte

CyberCyte Introduces Leadership Team

Learn more about Necati Ertuğrul, Andrew Richardson, and Aftab Afzal

 
 

Semperis

semperis.jpg
                   

Semperis arose from a need in today’s digital technology-driven culture to detect, recover and restore quickly from compromising and potentially disastrous Active Directory events, both on-premise and in the cloud. We exist to ensure a precise infrastructure integrity so that our customers – Fortune 500 companies, and financial, healthcare, government, and other enterprises worldwide – can do their important work effectively, continuously and confidently, without disruption.


  Their Stories With Semperis

 

STEALTHbits

Company-Directory-Stealthbits-Featured.jpg
                           

STEALTHbits is a leading data security software company that helps ensure the right people have the right access to the right information. We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense.



 

An InfoSec Life Column is Made Possible by the Generosity of STEALTHbits.

We are ever so grateful for your support!

 

  Live and On-Demand Webinars with STEALTHbits


  STEALTHbits Conversations on ITSPmagazine


  Their Story with STEALTHbits


  Where Can You Find STEALTHbits?


  Latest News and Updates from STEALTHbits


  STEALTHbits Expert Contributions to ITSPmagazine

 
 

Column Information Security

Column Information Security.jpg
                   

Column Information Security is a leading consulting and solutions provider for information security. Our set of comprehensive solutions and services for the enterprise, public sector and government organizations ensure mitigation of risk through strategic planning, implementation of leading technologies and building and operating security systems and programs.

 

 

 

 

Bomgar

Company-Directory-Bomgar.jpg
                   

Bomgar’s Secure Access solutions enable customers to easily support people, access and protect endpoints, and defend privileged credentials, in order to fight cyber threats and speed business performance. More than 13,000 organizations around the globe use Bomgar to deliver superior support services and reduce threats to valuable data and systems. Bomgar clients include some of the world’s leading IT outsourcers, systems integrators, software vendors, healthcare organizations, government agencies, universities, financial institutions, and retailers.


  Their Story Articles and Podcasts


  Recent Contributions to ITSPmagazine


Silverfort

Company-Directory-Silverfort.jpg
                   


Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.


  Their Story Articles and Podcasts

vintegrisTECH

vintegris.jpg
                  

vintegrisTECH manufactures innovative systems and applications for digital certificate issuing and management, legally binding digital signatures, and robust authentication. Its flagship product is nebulaSUITE, a comprehensive solution for guaranteeing digital identity, authentication, and secure access, as well as its own Certification Authority (CA). vintegrisTECH’s clients include leading banks, insurance, health, retail, government, and public-sector organizations.

 

Optimal IdM

                   

At Optimal IdM, we pride ourselves on innovation and superior customer service. With Optimal IdM you receive a customizable enterprise identity management solution that meets the specific security and scalability needs of your organization at an affordable price. It is The Optimal Difference that puts us ahead of the competition.


  Their Story Articles and Podcasts


  Podcasts on ITSP Radio

Jeff Bohren describes the challenges with managing identity in today’s hyper-connected world

What are the challenges with managing identity in today’s hyper-connected world? What is the role of federated identity management? How does the General Data Protection Regulation (GDPR) impact how identities are managed? Jeff Bohren, senior software architect for Optimal IDM, spends some time with ITSPmagazine's editor-in-chief, Sean Martin, during Black Hat USA 2017. The two explore these topics and more. Listen to find out how companies can leverage federated identities to reduce their exposure to non-compliance with GDPR and how 2FA and MFA needs to be considered as well, but in the context of each business scenario at hand.


CA Technologies

Company-Directory-CA-Technologies-Black.jpg
                   

We believe that a single idea can change the world. But great ideas only matter when they become real, ready-to-launch products and services. That’s why our mission is to help our customers eliminate the barriers between ideas and business outcomes.

For more than 30 years, we’ve fueled digital transformation through the power of software. Today we’re as committed as ever: partnering to help companies of all kinds seize opportunities and create real, meaningful change.


  Podcasts on ITSP Radio

 

 

CA Technologies' Mordecai Rosen talks digital transformation and the trust framework w/ Sean Martin

In today’s episode of At the Edge with Sean Martin, Sean has the pleasure of speaking with Mordecai (Mo) Rosen, Senior Vice President and General Manager of Cybersecurity at CA Technologies. During their chat, Mo tells us of his early days as a Unix kernel hacker at Bell Labs, later moving on to Sun Microsystems, and ultimately having his privileged access management company be acquired by CA technologies. An identity expert through and through, Mo reminds us that, as an industry, we need to do our best to remove the friction from security, a goal he holds to the highest level as he and his team at CA work to build a trust framework designed to enable the digital economy. Mo has already done a ton to support some of the largest companies achieve their own digital transformation, but it’s clear from my chat with him that he has a ton more on his cybersecurity bucket list. Have a listen, enjoy the chat, and you might just get inspired.

 

 

Tim Jarrett from CA Veracode talks about application security during Black Hat USA 2017

Tim Jarrett, CA Veracode, talks about application security with Sean Martin during Black Hat USA 2017. What are the drivers behind organizations choosing to invest in application security and who should lead the application security program? How do companies get on top of the problem of insecure components being used in applications? Tim shares his thoughts with us, tying it all together with the Internet of Things and the impact connected devices have on society - due to the vulnerabilities introduced at the application layer.


  Webinars and Videos on ITSP.TV

 

  Latest News

  Recent Contributions to ITSPmagazine

MicroStrategy

                   

Founded in 1989, MicroStrategy is a leading worldwide provider of enterprise software platforms. Our mission is to provide the most flexible, powerful, scalable, and user-friendly analytics and identity management platforms, offered either on premises or in the cloud.

 

Centrify

Company-Directory-Centrify.jpg
                   

Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience.

Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.


  Their Story Articles and Podcasts


66% Of Companies Still Breached
81% Of Breaches Involve Weak, Default, or Stolen Passwords

TODAY'S SECURITY IS NOT SECURE

Rethink Security with Zero Trust

 

  Latest News

  Where Can You Find Centrify?

 

  Contributions to ITSPmagazine

  Expert Contributors