IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

identity and access management (IAM)

Thoma Bravo adds Ping Identity to growing cyber security portfolio in $2.8 billion acquisition
Two interconnected puzzle pieces overlaid on a top-down cityscape
Acquisition

Thoma Bravo adds Ping Identity to growing cyber security portfolio in $2.8 billion acquisition

The intelligent identity company joins Proofpoint and Sophos, among others, as it looks to accelerate its cloud transformation
4 Aug 2022
Thales acquires OneWelcome to boost identity and data privacy management
A close up shot of a building with the words Thales displayed at the top
identity and access management (IAM)

Thales acquires OneWelcome to boost identity and data privacy management

The company is set to buy OneWelcome for €100 million (£84 million) and use its offerings to give users greater control of their data
12 Jul 2022
Cisco unveils new ‘intelligent’ approach to networking with brace of product launches
A white Cisco sign suspended from the ceiling of a dark conference room
Network & Internet

Cisco unveils new ‘intelligent’ approach to networking with brace of product launches

Cloud Management for Cisco Catalyst and Cisco Nexus both aim to bring deeper insights and ease the burden of IT teams
16 Jun 2022
CIAM buyer’s guide
Whitepaper cover with title and graphic made up of turquoise and grey pixelated shapeswhitepaper
Whitepaper

CIAM buyer’s guide

Finding the right CIAM solution to capture & retain customers, fuel business growth and keep customers safe
6 Jun 2022
The hybrid work maturity framework
Whitepaper cover with title and image of businesswoman sat in a window using a laptopwhitepaper
Whitepaper

The hybrid work maturity framework

Your roadmap to trusted flexible working
6 Jun 2022
What is identity management?
identity head digital
identity and access management (IAM)

What is identity management?

Make sure only the right people have access to your infrastructure
29 Apr 2022
LAPSUS$ breached T-Mobile systems, stole source code
A pink T-Mobile logo on a storefront in Aachen, Germany
data breaches

LAPSUS$ breached T-Mobile systems, stole source code

T-Mobile has denied that the hackers obtained customer or government information
25 Apr 2022
Thoma Bravo acquires SailPoint for $6.9 billion
Sailpoint Technologies Holdings Inc. signage is displayed at a subway entrance near the New York Stock Exchange (NYSE) in New York, U.S., on Friday, Nov. 17, 2017
mergers and acquisitions

Thoma Bravo acquires SailPoint for $6.9 billion

Following the acquisition, SailPoint will no longer be listed on any public market
11 Apr 2022
Okta reveals full extent of LAPSUS$ breach as hackers announce hiatus
Okta logo appearing on a smartphone held aloft by a silhouetted hand in front of a blue and purple background
cyber attacks

Okta reveals full extent of LAPSUS$ breach as hackers announce hiatus

Okta's CSO expressed regret over the company's handling of the situation, namely the lengthy delay between identifying the security incident and notif…
23 Mar 2022
SentinelOne to acquire Attivo Networks for $617 million
A smartphone with the SentinelOne logo displayed on screen
mergers and acquisitions

SentinelOne to acquire Attivo Networks for $617 million

The deal will broaden SentinelOne's access to extended detection and response technology
17 Mar 2022
UK gov unveils plan for nationwide digital identity scheme
Digital fingerprint
Policy & legislation

UK gov unveils plan for nationwide digital identity scheme

The government's fresh attempt to tackle digital identification will aim to improve upon the failed Verify project from 2013
11 Mar 2022
The state of SD-WAN, SASE and zero trust security architectures
Whitepaper cover with graphic of a man stood on a laptop in front of a padlock, in front of a cloud with a server in the cloud, plus other peoplewhitepaper
Whitepaper

The state of SD-WAN, SASE and zero trust security architectures

Be a leader in the deployment of zero trust, SD-WAN and SASE
8 Mar 2022
Busting the myths about SSO
Pixelated black and white image with whitepaper title above on white backgroundwhitepaper
Whitepaper

Busting the myths about SSO

Why SSO capability is critical to the success of IAM
7 Mar 2022
Gartner is mapping the future of secure access. Okta is helping organisations get there
Whitepaper cover with shaded multiple triangle graphicwhitepaper
Whitepaper

Gartner is mapping the future of secure access. Okta is helping organisations get there

Creating unified, consistent digital identities for users
7 Mar 2022
Three ways your customer identity strategy fuels business growth
Whitepaper cover with title and three cube graphic on light blue backgroundwhitepaper
Whitepaper

Three ways your customer identity strategy fuels business growth

Moving your business forward in innovative ways to jump-start growth
7 Mar 2022
Decoding Customer IAM (CIAM) vs. IAM
Whitepaper cover with image looking down at a lady sat on a couch with a laptop and bagwhitepaper
Whitepaper

Decoding Customer IAM (CIAM) vs. IAM

What’s the difference between CIAM and IAM?
7 Mar 2022
Build vs. buy: Roll your own auth vs. a pre-built identity layer
Whitepaper cover with title and black shaded square graphicswhitepaper
Whitepaper

Build vs. buy: Roll your own auth vs. a pre-built identity layer

Challenges of identity and access management
7 Mar 2022
Identity is key to stopping these five cyber security attacks
Whitepaper cover with a blurred image of a stack of data chipswhitepaper
Whitepaper

Identity is key to stopping these five cyber security attacks

Many attacks begin with the same weakness: user accounts
7 Mar 2022
The importance of a zero-trust model for hybrid working
A close up of a keyboard with graphics overlaid to represent cyber security and hacking
Sponsored

The importance of a zero-trust model for hybrid working

How identity-based security solutions can help protect our dispersed workforces
2 Mar 2022
Industry working group aims to standardize blockchain 'Identity of Things'
Abstract image showing a cube with a finger print on top, connected to other cubes, to symbolise identity and access management
blockchain

Industry working group aims to standardize blockchain 'Identity of Things'

Universal standards for blockchain-based identities aims to help promote interoperability and communication between IoT devices
15 Dec 2021
What is single sign-on (SSO)?
A close-up shot of a login portal
single sign-on (SSO)

What is single sign-on (SSO)?

We explain how SSO works and why you need it
2 Dec 2021
Your journey to zero trust
Image of speaker Dave Gruber in black and white with associated company logos along bottomwhitepaper
Whitepaper

Your journey to zero trust

What you wish you knew before you started
2 Dec 2021
Identity's role in zero trust
Title of the webinar on a blue background with an 'O' patternwhitepaper
Whitepaper

Identity's role in zero trust

Zero trust starts with a change in philosophy
2 Dec 2021