Innovation in Government - Fighting Cyber Threats with Identity Management

July 10, 2020

At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.

Previous Article
Best Practices for Securing Identity in the Cloud with CyberArk and AWS
Best Practices for Securing Identity in the Cloud with CyberArk and AWS

Zero Trust starts with identity and access management (IAM). From least privilege to authentication, this e...

Next Article
Understanding CyberArk SCIM Server and Cross-Domain Identity Management
Understanding CyberArk SCIM Server and Cross-Domain Identity Management

An overview of SCIM and value of the CyberArk SCIM server.