IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

identity and access management (IAM)

What is identity management?
identity head digital
identity and access management (IAM)

What is identity management?

Make sure only the right people have access to your infrastructure
29 Apr 2022
LAPSUS$ breached T-Mobile systems, stole source code
A pink T-Mobile logo on a storefront in Aachen, Germany
data breaches

LAPSUS$ breached T-Mobile systems, stole source code

T-Mobile has denied that the hackers obtained customer or government information
25 Apr 2022
Thoma Bravo acquires SailPoint for $6.9 billion
Sailpoint Technologies Holdings Inc. signage is displayed at a subway entrance near the New York Stock Exchange (NYSE) in New York, U.S., on Friday, Nov. 17, 2017
mergers and acquisitions

Thoma Bravo acquires SailPoint for $6.9 billion

Following the acquisition, SailPoint will no longer be listed on any public market
11 Apr 2022
Okta reveals full extent of LAPSUS$ breach as hackers announce hiatus
Okta logo appearing on a smartphone held aloft by a silhouetted hand in front of a blue and purple background
cyber attacks

Okta reveals full extent of LAPSUS$ breach as hackers announce hiatus

Okta's CSO expressed regret over the company's handling of the situation, namely the lengthy delay between identifying the security incident and notif…
23 Mar 2022
SentinelOne to acquire Attivo Networks for $617 million
A smartphone with the SentinelOne logo displayed on screen
mergers and acquisitions

SentinelOne to acquire Attivo Networks for $617 million

The deal will broaden SentinelOne's access to extended detection and response technology
17 Mar 2022
UK gov unveils plan for nationwide digital identity scheme
Digital fingerprint
Policy & legislation

UK gov unveils plan for nationwide digital identity scheme

The government's fresh attempt to tackle digital identification will aim to improve upon the failed Verify project from 2013
11 Mar 2022
The state of SD-WAN, SASE and zero trust security architectures
Whitepaper cover with graphic of a man stood on a laptop in front of a padlock, in front of a cloud with a server in the cloud, plus other peoplewhitepaper
Whitepaper

The state of SD-WAN, SASE and zero trust security architectures

Be a leader in the deployment of zero trust, SD-WAN and SASE
8 Mar 2022
Busting the myths about SSO
Pixelated black and white image with whitepaper title above on white backgroundwhitepaper
Whitepaper

Busting the myths about SSO

Why SSO capability is critical to the success of IAM
7 Mar 2022
Gartner is mapping the future of secure access. Okta is helping organisations get there
Whitepaper cover with shaded multiple triangle graphicwhitepaper
Whitepaper

Gartner is mapping the future of secure access. Okta is helping organisations get there

Creating unified, consistent digital identities for users
7 Mar 2022
Three ways your customer identity strategy fuels business growth
Whitepaper cover with title and three cube graphic on light blue backgroundwhitepaper
Whitepaper

Three ways your customer identity strategy fuels business growth

Moving your business forward in innovative ways to jump-start growth
7 Mar 2022
Decoding Customer IAM (CIAM) vs. IAM
Whitepaper cover with image looking down at a lady sat on a couch with a laptop and bagwhitepaper
Whitepaper

Decoding Customer IAM (CIAM) vs. IAM

What’s the difference between CIAM and IAM?
7 Mar 2022
Build vs. buy: Roll your own auth vs. a pre-built identity layer
Whitepaper cover with title and black shaded square graphicswhitepaper
Whitepaper

Build vs. buy: Roll your own auth vs. a pre-built identity layer

Challenges of identity and access management
7 Mar 2022
Identity is key to stopping these five cyber security attacks
Whitepaper cover with a blurred image of a stack of data chipswhitepaper
Whitepaper

Identity is key to stopping these five cyber security attacks

Many attacks begin with the same weakness: user accounts
7 Mar 2022
The importance of a zero-trust model for hybrid working
A close up of a keyboard with graphics overlaid to represent cyber security and hacking
Sponsored

The importance of a zero-trust model for hybrid working

How identity-based security solutions can help protect our dispersed workforces
2 Mar 2022
Industry working group aims to standardize blockchain 'Identity of Things'
Abstract image showing a cube with a finger print on top, connected to other cubes, to symbolise identity and access management
blockchain

Industry working group aims to standardize blockchain 'Identity of Things'

Universal standards for blockchain-based identities aims to help promote interoperability and communication between IoT devices
15 Dec 2021
What is single sign-on (SSO)?
A close-up shot of a login portal
single sign-on (SSO)

What is single sign-on (SSO)?

We explain how SSO works and why you need it
2 Dec 2021
Your journey to zero trust
Image of speaker Dave Gruber in black and white with associated company logos along bottomwhitepaper
Whitepaper

Your journey to zero trust

What you wish you knew before you started
2 Dec 2021
Identity's role in zero trust
Title of the webinar on a blue background with an 'O' patternwhitepaper
Whitepaper

Identity's role in zero trust

Zero trust starts with a change in philosophy
2 Dec 2021
ID.me and Sterling Check partner on in-person identity verification
ID.me logo
identity and access management (IAM)

ID.me and Sterling Check partner on in-person identity verification

The joint solution improves equity and access to government benefits
19 Nov 2021
Identity-focussed security for your zero trust journey
Title of the webinar in white text against a blue backgroundwhitepaper
Whitepaper

Identity-focussed security for your zero trust journey

Steps to protect your business from identity-driven threats
16 Nov 2021
How to increase zero trust maturity
A stack of three white blocs next to a blue panel saying 'Digital Identity Webcast Series'whitepaper
Whitepaper

How to increase zero trust maturity

The business benefits of modern identity
16 Nov 2021
2021 Thales access management index: European edition
Two people working at a large table with papers and a colour swatch outwhitepaper
Whitepaper

2021 Thales access management index: European edition

The challenges of trusted access in a cloud-first world
7 Oct 2021
2021 Thales access management index: Global edition
Bird's eye view of a woman sitting on a circular couch looking at a laptop whitepaper
Whitepaper

2021 Thales access management index: Global edition

The challenges of trusted access in a cloud-first world
7 Oct 2021