Rethink Identity Governance in Healthcare
By: KPMG LLP SailPoint View more from KPMG LLP SailPoint >>
Download this next:
SailPoint, IBM, Oracle, and more: Comparing IGA vendors
By: SailPoint Technologies
Type: Analyst Report
Traditionally, identity governance administration (IGA) was called the passive side of governance, where organizations would implement largely on premises to improve their regulatory compliance positions.
Now, IDC believes IGA is finding new acceptance across the broader market due in part to the emergence of cloud-based alternatives.
This report provides an overview of the current IGA solution market, highlighting and comparing the leading vendors, including organizations such as:
- SailPoint Technologies
- Oracle
- IBM
- And more
Download now to learn more.
These are also closely related to: "Rethink Identity Governance in Healthcare"
-
CW APAC October 2023 – Buyer’s guide to IAM
By: TechTarget ComputerWeekly.com
Type: Ezine
Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk’s growth, the uses of automation and how ForgeRock enhances user experience.
-
Revenue acceleration for digital leaders
By: TechTarget ComputerWeekly.com
Type: Research Content
Companies across the corporate spectrum are striving to implement digital transformation strategies to drive up agility, responsiveness and enhance the customer experience.
A clear minority of leaders are starting to emerge who are reaping the benefits. In fact, according to the 2018 Harvey Nash/KPMG CIO Survey – the largest IT leadership survey in the world, taking in the views of nearly 4,000 IT leaders across 84 countries – 61% of companies that are effective at using digital technologies see higher revenue growth than their competition.
But the majority of businesses are finding it more challenging – a reality that came through very clearly in this year’s survey. However, there are a number of clear priorities that organisations can embrace to drive better, quicker and more certain returns. This report from KPMG gives three key action points.
Find more content like what you just read:
-
4 ways to avoid gambling with cyber risk disclosure
By: ServiceNow
Type: eBook
In this e-book, learn the top 4 ways your organization can avoid gambling with cyber risk disclosure, and discover everything you need to know about recent US SEC mandates.
-
Computer Weekly – 7 March 2023: Can the UK keep its fintech crown?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, two years after the Kalifa report laid out a roadmap for continued fintech sector growth, UK entrepreneurs and startups are worried about the lack of progress. We look at the top tech trends in retail and find out which companies are leading the way. And we examine six ways to slash IT emissions. Read the issue now.
-
Computer Weekly 16 July 2019: Reaping the benefits of digital transformation at Defra
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.
-
A Computer Weekly buyer's guide to blockchain technology
By: TechTarget ComputerWeekly.com
Type: eGuide
Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
-
CW Middle East Jan to Mar 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
-
“Back to baseline”: How to escape legacy over-customization
By: ServiceNow and KPMG
Type: ESG Showcase
Discover in this ESG showcase how KPMG’s “Back to Baseline” streamlines processes, accelerate value realization for stakeholders, and readies organizations for the future of ServiceNow.
-
Examining Identity and Access Management's Function in Healthcare
By: XtelligentMedia Healthcare
Type: eGuide
Identity and access management is a crucial component of any healthcare organization's security strategy.
-
Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.
-
Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.
-
Identity Governance & Administration Solution Buyer’s Guide
By: Saviynt
Type: White Paper
Over the last few years, cloud acceleration, security threats, and constant technology transformation have bombarded enterprises. IGA is fundamental to modern enterprise security. Importantly, IGA builds a foundation for Zero Trust across cloud, hybrid, and on-prem environments. Read on to learn more.
-
A Computer Weekly buyer's guide to supply chain security
By: TechTarget ComputerWeekly.com
Type: eGuide
Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.
-
10 benefits of AI-powered identity compliance
By: SailPoint Technologies
Type: eBook
Meeting and maintaining compliance entails high volumes of work, often comprised of tedious, repetitive and redundant tasks. With AI you can meet compliance, secure identities, and save resources by automating these tasks. Read this e-book to learn more.
-
Identity security: Transforming how organizations meet regulatory compliance
By: SailPoint Technologies
Type: eBook
Meeting regulatory compliance is a complex challenge that can introduce further challenges into already difficult business. SailPoint AI-driven identity security ensures authorized access to sensitive data, allowing for an easier compliance process through the following benefits. Read on to learn more.
-
Autonomous identity security: Combining IGA and automation
By: SailPoint Technologies
Type: White Paper
Managing identities was simpler when you only had to worry about user profiles, but What if machine identities could manage themselves, without presenting a risk for security? Autonomous identity security combines automation with IGA practices to create a system that manages access without the need for human input. Read on to learn more.
-
Infographic: Harvey Nash KPMG CIO Survey 2017
By: TechTarget ComputerWeekly.com
Type: Research Content
This infographic from a survey of nearly 9,000 IT leaders in 90 countries shows how CIOs are managing change, prioritising innovation and digital technology, and reporting greater job satisfaction.
-
A Computer Weekly buyer's guide to anti-ransomware
By: TechTarget ComputerWeekly.com
Type: eBook
The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
-
CW APAC, May 2022: Trend Watch: Datacentres
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.
-
CW Innovation Awards: SIA taps blockchain for loyalty app
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
-
CIO Trends #9
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.
-
Leader’s guide to strategic automation’s benefits
By: ServiceNow
Type: eBook
“Hyperautomation is irreversible and inevitable,” explains Research VP at Gartner, Brian Burke. With that in mind, how can you maximize the benefits of hyperautomation at your organization? Dive into this ServiceNow e-book for insights and recommendations.
-
A Computer Weekly buyer's guide to edge datacentres
By: TechTarget ComputerWeekly.com
Type: eBook
Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.
-
How to accelerate your risk and compliance initiatives—and get to value faster
By: ServiceNow
Type: eBook
Explore in this e-book some of the top risk and resilience management solutions available to your organization that can help you break silos, help embed risk and compliance management into daily work, and improve performance through risk-informed decisions.
-
Computer Weekly: Data Danger
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?
-
Using AIOps to Thwart Data Breaches
By: ServiceNow
Type: White Paper
At 83%, a vast majority of businesses studied in the “2022 Cost of a Data Breach” report experienced more than one data breach. Take a look through this white paper to learn how, by leveraging AIOps, you can protect your organization from a similar fate.
-
Empower users and free IT teams with modern identity security
By: SailPoint Technologies
Type: eBook
With drastic increases in the number of digital threats, modern IT departments are easily bogged down. This e-book explores 5 best practices for how IT teams can utilize identity security to deal with the overwhelming volume of security tasks and improve efficiency, including. Read on to learn more.
-
Customer experience insights guide
By: ARG, Inc.
Type: Analyst Report
According to a recent study, every year $98 billion is lost by companies failing to provide “simple” experiences that customers want. This report provides a complete breakdown of the current state of customer experience, looking at the key trends defining the modern customer’s demands. Read on to learn more.
-
Infographic: Top IT predictions in APAC in 2022
By: TechTarget ComputerWeekly.com
Type: Infographic
As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
-
CW APAC: CIO trends
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead
-
MSSP landscape: The leaders, their capabilities & more
By: Trustwave
Type: Analyst Report
Review this “ISG Provider Lens Quadrant” report to compare the strengths, challenges and capabilities of 20 top MSSPs for midsize enterprises.
-
Computer Weekly – 12 December 2023: Shaping the modern workplace
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.
-
Large Enterprises: Consider Your MSSP Options
By: Trustwave
Type: Analyst Report
Take a look through this “ISG Provider Lens Quadrant” report to learn about 27 MSSPs that can support the needs of large enterprises.
-
Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
-
Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.
-
Computer Weekly 19 March 2019: How IT leaders should work with marketing
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, experts advise on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at a key ethical aspect of AI – how to explain the decisions an AI makes. Read the issue now.
-
Integrating Brivo’s Access Control APIs in the Community Parking Garage
By: Brivo
Type: Case Study
Ledger, a modern, mixed-use destination workplace, needed a parking garage service that offered digital and mobile accommodation. With a joint solution from Parkable and Brivo eases Ledger’s administrative burden and saves money, providing easy-to-use digital booking with Brivo’s access control APIs ensuring security. Read on to learn more.
-
Identity trends for 2023
By: TechTarget ComputerWeekly.com
Type: eGuide
Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
38-page report on the zero-trust landscape
By: Okta
Type: Research Content
In partnership with Qualtrics, Okta conducted a global study with the help of 860 information security decisionmakers across a range of industry verticals. In the 38 pages of this report, Okta has condensed the findings of this research so that you can extract the most valuable and relevant information. Read on to learn more.
-
-
Computer Weekly - 10-16 September 2019: A tech boost for social care
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
-
IT Priorities 2020: European IT budget share reflects home-working challenges brought by Covid
By: TechTarget ComputerWeekly.com
Type: eGuide
European organisations are being forced to redivert more limited budgets during the pandemic. This Eguide dives into the reasons as to how and why this shift is occurring in IT companies across the continent.
-
Guiding Your Leadership Team Through the Zero Trust Mindset
By: CyberArk
Type: White Paper
Zero trust identifies users and entities and grants them just the right amount of access as needed. In this e-book, LATAM Field Technology Director at CyberArk, Cláudio Neiva, leverages his 24 years of experience to break down the essential elements of zero trust. Read on to learn more.
-
Cloud security & IAM: Security essentials
By: Nexum
Type: eGuide
Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.
-
Managing third-party identity risk
By: SailPoint Technologies
Type: Data Sheet
Today’s organizations no longer reside behind a digital perimeter, with countless other third-party entities presenting access risk. SailPoint Non-Employee Risk Management aims to bolster identity security by extending advanced governance controls to large and complex populations of non-employee users. Download this data sheet to learn more.
-
Top 10 Australian IT stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at how the country is harnessing cutting-edge technologies to solve problems, while paving the way for emerging areas such as open banking.
-
Computer Weekly - 8 February 2022: Exploring the metaverse
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
-
The Holistic Identity Security Model
By: CyberArk
Type: ESG Research Report
According to a recent study conducted by Enterprise Strategy Group (ESG), only 9% of organizations have reached full maturity in their identity security programs. This report presents the full scope of findings from ESG’s recent research into identity security. Read on to learn more.
-
CIO Trends #10: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.