ema-logo-secondary-c

Cybersecurity Asset Management for Vulnerability Management: Key Capabilities, Benefits

By Chris Steffen on Feb 28, 2022 8:46:39 AM

This is the last in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management and Part 2  focused on how a cybersecurity asset management solution improves an organization’s vulnerability management program. Part 3 of the series provides a brief summary and some perspectives on the benefits of a cybersecurity asset management solution as it relates to vulnerability management.

Continue Reading

Accelerate Network Automation by Pivoting From Homegrown to Commercial Software

By Shamus McGillicuddy on Feb 24, 2022 8:11:24 AM

Sponsored post for Gluware

Continue Reading

Improving Vulnerability Management With Cybersecurity Asset Management

By Chris Steffen on Feb 17, 2022 10:08:25 AM

This is the second in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management. Part 2 of the series focuses on how a cybersecurity asset management solution improves an organization’s vulnerability management program.

Continue Reading

Simplify Vulnerability Management With Cybersecurity Asset Management

By Chris Steffen on Feb 10, 2022 9:41:39 AM

This is the first in a three-part blog series by Enterprise Management Associates (EMA) for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. Part one of the series focuses on defining the cybersecurity asset management solutions category and includes a summary definition of vulnerability management.

Continue Reading

NetOps and SecOps Partnerships Flourish With Modern DDI Technology

By Shamus McGillicuddy on Nov 17, 2021 8:50:01 AM

More than 75% of enterprises are reporting increased collaboration between their NetOps teams and SecOps teams , according to EMA's new research on NetSecOps partnerships. Digital transformation is a significant driver of this collaboration. About four out of five enterprises reported that NetSecOps collaboration is in response to public cloud adoption, work-from-anywhere initiatives, data center modernization, the internet of things, and edge computing.

Continue Reading

Data Security in a Multi-Cloud World...

By Chris Steffen on Jul 22, 2021 8:24:36 AM

 

Continue Reading

Five Key Identity Governance Features That Your Identity and Access Management Solution Does NOT Support

By Steve Brasen on Mar 18, 2021 9:23:32 AM

Since the start of the COVID-19 pandemic, identity management has taken center stage as the key enterprise security practice for enabling remote workforces while protecting company data and IT services. Though much of the media hype has focused on evolving technologies in enterprise identity and access management (IAM)—such as enabling passwordless and multifactor authentication—it is often overlooked that identity governance and administration (IGA) is experiencing its own renaissance not only due to pandemic-related access requirements, but also in support of recently-enacted compliance regulations, such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

Continue Reading

F5 / AWS Integration Podcast...

By Chris Steffen on Oct 20, 2020 9:35:31 AM

I had the opportunity to participate in a podcast with the team at F5. Christine Puccio – VP of Global Cloud Alliances and Heath Parrott – Senior Global Solutions Architect for Cloud discussed their latest announcement: the integration between F5 Essential App Protect, a web application firewall (WAF) SaaS solution and Amazon CloudFront, a content delivery network (CDN) solution from Amazon Web Services (AWS).

Topics: AWS F5 CDN WAF
Continue Reading

F5 WAF / AWS CloudFront Integration...

By Chris Steffen on Oct 20, 2020 8:00:00 AM

Recently, I had the opportunity to participate in a podcast with the team at F5. Christine Puccio – VP of Global Cloud Alliances and Heath Parrott – Senior Global Solutions Architect for Cloud discussed their latest announcement: the integration between F5 Essential App Protect, a web application firewall (WAF) SaaS solution and Amazon CloudFront, a content delivery network (CDN) solution from Amazon Web Services (AWS). Before discussing the announcement specifically, I thought it would be best to provide a bit of insight into these complementary technologies.

Continue Reading

Why Consumer IAM is Fundamentally Different From Traditional IAM

By Steve Brasen on Oct 6, 2020 9:34:58 AM

Identity and access management (IAM) has been an integral part of IT since the early days of computing. Foundational to the security of IT resources is the need to identify who may access them, and placing limits on what they can do with them. Since these requirements were principally established to support internal business processes, IAM practices and technologies evolved to specifically support business employees. Following the introduction of the internet, however, new security challenges evolved in support of ecommerce. Rather than having to support a limited number of employees, businesses now must ensure the secure delivery of digital engagements with an expansive range of customers and marketing prospects. These challenges greatly accelerated over the last two decades due to the rise in popularity of consumer-focused cloud services and increasing user mobility.

Continue Reading
  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts