Identity and Access Management - Blog - Identity and Access Management - Dell Community
  • Andy Vallila (SonicWALL and One Identity) and Brian Kelly, University CISO, to Discuss Cybersecurity Issues at the Campus Technology 2016 Conference in Boston

    Anna just started her freshman year at her dream school. Nervous and excited to start her college journey, she has many things on her mind, such as arriving at her 8:00 a.m. class on time, finding the perfect study group and acing English 101. As with many daughters off to live on campus, her parents talked to her about campus security until she couldn’t help but roll her eyes. But the one looming thing that isn’t on Anna’s mind is the security on her college’s network. For her university, however, cybersecurity is of utmost importance. Today’s students, like Anna...
  • Digital Transformation Affects Every Organization

    A common misconception is that Digital Transformation is limited to certain industries, such as the ones supplying “smart homes” or “smart cities”. This is wrong. In fact, nearly every organization is impacted by Digital Transformation. Prominent examples include the automotive industry being challenged by companies such as Apple or Google; the taxi industry being challenged by Uber and others; the banks being challenged by PayPal. Most industries, both in manufacturing and in services, are facing challenges from the Digital Transformation of businesses – and many...
  • Digital Transformation: Why Security and Privacy Matter

    Digital Transformation of business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation. Organizations that do not adapt to the transformation are risking their very survival. Furthermore, connecting things with apps and services imposes new challenges, such as product security, liability issues, and how to appropriately handle customer data. This document discusses how IT must transform in general and how Information Security can be a business enabler for Digital Transformation. Digital Transformation is not a one-time makeover...
  • Global Survey: Digital Transformation Accelerated When IT Security Is Included in Planning

    The global Digital Transformation Security Survey , executed by Dimensional Research , queried 631 IT decision-makers about the impact of digital transformation on security teams. Survey responses indicated that businesses expect growth and have plans to invest in new technologies that will help them make the digital transformation. So chances are that your organization will undergo a digital transformation whether you’re personally ready or not! Here’s a sampling of survey findings: 97 percent of global respondents say they’re investing in digital technologies to transform...
  • Bakersfield Police Dept Locks Down Remote Access with Dell Defender

    Read more about how the City of Bakersfield handles the increased use of mobile devices by the city’s police department and other field personnel. Recently, I spent a few great days at Gartner Security Summit 2016. At security events like this, I’m always leave impressed by the level of conversations that folks from every industry and every region of the world. There’s a lot of shared themes of the type of things that they all deal with and think about in terms of making their workplace secure. At the Gartner event, it didn’t matter if the discussions happened over meals...
  • Simplifying Identity Governance and Streamlining Compliance

    The controls used in the cardholder data environment (CDE) and the risks considered during the CDE scoping effort, such as all possible user access to account data (CHD and SAD), the DSS points them to consider whether the organization identified “all locations and flows of cardholder data, and identify all systems that are connected to or, if compromised, could impact the CDE (for example, authentication servers) to ensure they are included in the PCI DSS scope.” For a proper controls reliance strategy, organizations need to unify user identities across all applications granting access...
  • Payment and Business Applications Security Features Are Insufficient

    Using the user, group and role-based management features of payment and business applications that accept cardholder data or sensitive authentication data is not enough to secure your data and ensure compliance with PCI DSS requirements. The set of system components that make up your cardholder data environment (CDE) comprises not only point of sale systems and the primary business applications that capture sales transaction information, but also logically accessible support systems such as file servers, mail servers, backup servers, and network devices. The CDE scope extends to underlying platforms...
  • Payment Card Industry Data Security Standard

    While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB International. What this means, essentially, is that all banks that process the payment transactions associated with these cards are responsible for ensuring that merchants meet the standard or face severe penalties. PCI DSS has an extensive reach — it applies not only to your business, but also to virtually any vendor that supports your organization...
  • How to Surpass Payment Card Industry (PCI) Data Security Standard (DSS) Compliance

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. IT security compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and daily business risks, and they often lose out in the battle for resources and funding. However, in any industry where compliance is an issue, organizations cannot afford to ignore it. Sooner or later, they are going to be required to demonstrate that they have the appropriate IT-related internal controls in place to minimize the risk of...
  • Show Us Your Best #GartnerSec Selfie!

    We are calling all Gartner Security & Risk Management Summit attendees to show us your most creative selfie in front of our #DeptofYes Wallscape that is located in our Dell Security: Welcome to the Dell Security Department of Yes Hospitality Suite in National Harbor 12. Once you snap that perfect selfie, please make sure you use the hashtag #DeptofYes and #DELLSPONSORED and tweet your picture. We will be selecting a total of 50 people on the spot and each person we select will receive a $10 Starbucks Gift Card. Here are some basic guidelines before you submit: No group photos...