Privileged identity management

What is Privileged Identity Management?

Privileged Identity Management (PIM) is a capability within identity management focused on the special requirements of managing highly privileged access. PIM is an information security and governance tool to help companies meet compliance regulations and to prevent system and data breaches through the improper use of privileged accounts. The management of privileged identities is automated… Read more…

enterprise mobility

What is Enterprise Mobility?

Enterprise mobility is the term used to describe the extension of an organization’s modern tools and data to a workforce that more often than not outside the traditional physical boundaries of a business. It is the ability for workers to connect, operate, and conduct business seamlessly without regards to time or proximity of co-workers and… Read more…

Security transformation

What is the Security Transformation?

The security transformation is a term used to describe a profound shift in the IT industry. It would be easy enough to say that IT security has become more important, or that there are more security considerations, but the security transformation is more about a qualitative shift: a different way of thinking about IT security.… Read more…

What is SaaS

What is SaaS?

SaaS stands for ‘Software as a Service’, part of what many people would describe as cloud computing. How does SaaS work? Software as a Service is when a software company provides their software on a hosted platform. SaaS provides the infrastructure for software so that the customer does not have to setup or maintain the… Read more…

Office 365

What is Office 365?

Office 365 (O365) is the cloud version of Office. Office is a collection of productivity applications – things like Excel, Word and PowerPoint, and so much more – the backbone of Microsoft’s “user” offering (versus the back office offerings like SQL Server, Exchange, and so on). For some users this is a totally cloud experience… Read more…

Azure AD cloud

What is Azure AD?

Azure AD (Active Directory) is Microsoft’s multi-tenant, cloud-based Identity as a Service (IDaaS) solution. It provides organizations of all sizes an affordable and easy to use means of enabling Single Sign-On (SSO) to thousands of first and third-party Software as a Service (SaaS) applications like Office 365, Salesforce.com, ServiceNow, Concur and others. For organizations building… Read more…

identity protection

What is Identity Protection?

Identity protection is a phrase used to describe activities that safeguard digital identities (and information linked to those identities) from being used by unauthorized sources for (usually) illegal advantage. Identity theft is now big business. Some personal identity information is easy to obtain publicly, for example name, address and telephone number. Other types of personal… Read more…

Hybrid Cloud

What is Hybrid Cloud

Hybrid cloud is a computing environment which combines on-premises, private cloud and public cloud services. These services can be efficiently and securely integrated. Hybrid cloud allows organizations to take advantage of existing investments in on-premises data and application access, while providing secure access to platforms and services from one or more other cloud service providers… Read more…

Machine learning

What is machine learning?

Machine learning is the study and construction of algorithms that can learn from and make predictions on data. Algorithms follow strictly static program instructions by making data-driven predictions or decisions, through building a model from sample inputs.  Machine learning is a subfield of computer science concerned with computational learning, evolved from the study of pattern and… Read more…

identity driven security

What is Identity-Driven Security?

In the modern world of cloud and devices, there are few things that we can control to keep the bad guys out. We can no longer rely on a physical perimeter, but we can put controls around identity information. That’s why identity-driven security is so vital. Identity should be at the heart of safeguarding users,… Read more…

Internet of things

What is the Internet of Things (IoT)?

The ‘Internet of Things’, IoT, is the idea of connecting any device with an on/off switch to the internet. Intelligent connectivity of physical devices is rapidly increasing productivity, levels of communication and enabling numerous functions across organizations worldwide. The ‘Internet of Things’ enables objects and devices to connect to the Internet. It allows business technologies… Read more…

Privileged Access Management PAM

What is Privileged Access Management?

Privileged Access Management (PAM) is a security process, now available in Microsoft Identity Manager (MIM). Systems admins are privileged users and are targeted by hackers as they often have access to all areas of an IT infrastructure. Once a hacker has hijacked a privileged user account, they have free-rein. PAM can keep safe those who have… Read more…

Authentication

What is Authentication?

Who are you? Resources within an IT infrastructure are secured through a combination of authentication (who is trying to access the resource) and authorization (are they allowed to use the resource, and how are they allowed to use it). Many people confuse authentication with authorization. Authentication is just establishing who wants access (with a set… Read more…

conditional access

What is Conditional Access?

Conditional access is a set of policies and configurations that control which devices have access to various services and data sources. In the Microsoft environment, conditional access works with the Office 365 suite of products, as well as with SaaS apps which are configured in Azure Active Directory. Why do we need conditional access With… Read more…

what is identity governance

What is Identity Governance?

Identity Governance is the guiding policies and processes for how roles and user access should be administered across a business environment. This is based on the orchestration of centralized user identity management system/s, with sound access controls, mitigating controls, processes, and procedures. Read more…

what is GRC: Governance, Risk Management, and Compliance

What is GRC?

GRC stands for Governance, Risk Management, and Compliance. GRC are three disciplines that can help ensure an organization meets its objectives. An organization: needs processes that help it to achieve its aims (governance) should attempt to assess and mitigate the risks that may prevent this, (risk management) and should comply with relevant internal and external… Read more…

what is SSO

What is SSO?

SSO properly stands for Single Sign-On, though it is sometimes used to mean Same Sign-On. These should not be confused, though they often are, and sometimes deliberately! What’s SSO for? Typically, in any organization of size, users will need access to many IT systems, for example, AD, SAP, Azure AD, an HR system, SalesForce, legacy… Read more…

What is MIM?

What is MIM?

Microsoft Identity Manager (MIM) is an on-premises server-based synchronization engine that synchronizes users’ digital identity data between systems. Read more…

MIM FIM ILM compared

MIM, FIM and ILM compared

What are the differences between MIM, FIM and ILM? MIM 2016, the latest incarnation of Microsoft’s on-premises identity management platform, incorporates the best features of its predecessors, FIM 2010 and ILM, plus additional components. Going from ILM 2007 to FIM 2010, we got more management agents (“connectors” if you like), but we also got the… Read more…

No items match your filters.