Search Results for "identity"

Identiverse 2023: Security Conference Dates for Identity and Access Management (IAM)

Credit: Getty Images

Identiverse 2023 security conference city location & dates. Cybersecurity event for identity and access management (IAM) experts.

SentinelOne, Ping Identity Unveil XDR, Identity and Access Management (IAM) Integration

Credit: SentinelOne

SentinelOne and Ping Identity offer the SentinelOne Singularity XDR App for PingDirectory and Singularity XDR App for PingOne solutions.

M&A List: Identity and Access Management (IAM) Security Mergers and Acquisitions

Credit: Getty Images

M&A activity in the identity and access management (IAM) security market remains strong. Here are the IAM buyers, sellers & private equity investors.

Two Cybersecurity Startups Land Early-Stage Funding for Insurance, Identity Platform

Credit: Pixabay

Elpha Secure Technology lands $20 million in funding while Oort, an identity-centric enterprise security platform, gets a $15 million boost.

Axiad Research: Identity Authentication Hampered by Complexity, Multiple Solutions

Credit: Getty Images

Organizations are grappling with complex systems and requirements, resulting in a siloed approach to authentication, Axiad reports.

Atos Declines to Sell Identity and Access Management Security Business to Private Equity Firm

Credit: Atos

Atos rejects unsolicited $4.11 billion buyout offer for Evidian identity and access management (IAM) security software business.

Okta Oktane 2022 Identity and Access Management (IAM) Security Conference Dates

Okta Oktane 2022 cybersecurity conference dates & city location for identity and access management (IAM) professionals.

Hitachi Sells Identity Security Business to Volaris

Credit: Getty Images

M&A Deal: Identity, privileged access and password management asset sale follows recent Hitachi MSSP reorganization.

Identity Security Company CyberArk Acquires Cloud Security Specialist C3M

Credit: Getty Images

Acquisition may allow MSSP & MSP partners to find & fix cloud security misconfigurations across AWS, Google Cloud & Microsoft Azure.

Identity Cyberattacks, Microsoft 365 Dominate Cybersecurity Incidents, Expel Research Finds

Credit: Getty Images

How cyberattacks & business email compromise (BEC) hackers overcome multi-factor authentication (MFA) to hit Microsoft 365, according to Expel research.