A Practical Approach to GDPR Requirements

At the time of this webinar, many enterprises are/were finalizing their plans for addressing new requirements of the GDPR directive. GDPR has both a business and a technical impact, which is particularly challenging when the enforcement regime is so unclear at this point in time. In this webinar, experts from EY and Axiomatics discuss the […]

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, stores and manages data with access in mind for over 175,000 user accounts. Over the past 50 years, the company has solved difficult technical problems for this population with innovative, forward-thinking solutions. With time however, the company had outgrown its systems, […]

EY Digital Identity and Access Management Report

As organizations shift business strategies towards new digital channels to maintain a competitive advantage, and consumers become increasingly reliant on multiple device connections, cybersecurity threats are becoming more prolific and more sophisticated than ever before. Cybersecurity is no longer about prevention, but rather about detection and readiness for the inevitable. And everyone, from boardroom to […]

6 Alarming Facts About Electronic Health Records

One of the most difficult issues for a CIO to tackle is the ability to know who has access to what critical data and why. In the the case of healthcare and insurance providers, Electronic Health Records (EHR) contain even more valuable information than most data sources due to the sensitive and detailed nature of […]

Security Compliance Using Externalized Authorization

Central Decision Point for Fine-grained Access Control: Entitlements Management To effectively comply with various industry regulations, businesses require integrated, cost-effective information risk management solutions that can protect data and manage entitlements over applications. This document offers guidance on conducting an organizational IT risk assessment, and provides a template for determining what type of security controls […]